First published: Fri Nov 18 2016(Updated: )
The library's failure to check if certain message types support a particular flag, the HDF5 1.8.16 library will cast the structure to an alternative structure and then assign to fields that aren't supported by the message type and the library will write outside the bounds of the heap buffer. This can lead to code execution under the context of the library.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
HDF5 | =1.8.16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2016-4332 is considered high due to its potential to allow for arbitrary code execution through heap buffer overflow.
To fix CVE-2016-4332, upgrade the HDF5 library to version 1.8.17 or later, as it contains the necessary patches.
CVE-2016-4332 affects systems using HDF5 version 1.8.16, commonly in data processing and scientific applications.
Yes, CVE-2016-4332 can potentially lead to data loss due to arbitrary code execution resulting from a heap buffer overflow.
Yes, CVE-2016-4332 is exploitable remotely if the affected HDF5 library is used in network-facing applications.