Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2016-4330 | First vendor Publication | 2016-11-18 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H | |||
---|---|---|---|
Overall CVSS Score | 8.6 | ||
Base Score | 8.6 | Environmental Score | 8.6 |
impact SubScore | 6 | Temporal Score | 8.6 |
Exploitabality Sub Score | 1.8 | ||
Attack Vector | Local | Attack Complexity | Low |
Privileges Required | None | User Interaction | Required |
Scope | Changed | Confidentiality Impact | High |
Integrity Impact | High | Availability Impact | High |
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 6.9 | Attack Range | Local |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 3.4 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
In the HDF5 1.8.16 library's failure to check if the number of dimensions for an array read from the file is within the bounds of the space allocated for it, a heap-based buffer overflow will occur, potentially leading to arbitrary code execution. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4330 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 |
Snort® IPS/IDS
Date | Description |
---|---|
2016-11-17 | HDF5 msg_dtype H5T_ARRAY heap buffer overflow attempt RuleID : 40794 - Revision : 3 - Type : FILE-OTHER |
2016-11-17 | HDF5 msg_dtype H5T_ARRAY heap buffer overflow attempt RuleID : 40793 - Revision : 3 - Type : FILE-OTHER |
2016-11-17 | HDF5 msg_dtype H5T_ARRAY heap buffer overflow attempt RuleID : 40792 - Revision : 3 - Type : FILE-OTHER |
2016-11-17 | HDF5 msg_dtype H5T_ARRAY heap buffer overflow attempt RuleID : 40791 - Revision : 3 - Type : FILE-OTHER |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2017-01-10 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_91e039edd68911e6917114dae9d210b8.nasl - Type : ACT_GATHER_INFO |
2017-01-03 | Name : The remote Debian host is missing a security update. File : debian_DLA-771.nasl - Type : ACT_GATHER_INFO |
2017-01-03 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201701-13.nasl - Type : ACT_GATHER_INFO |
2016-12-28 | Name : The remote Fedora host is missing a security update. File : fedora_2016-3477b592e3.nasl - Type : ACT_GATHER_INFO |
2016-12-01 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-3727.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Source | Url |
---|
Alert History
Date | Informations |
---|---|
2024-11-28 12:56:25 |
|
2021-05-04 12:49:30 |
|
2021-04-22 02:00:21 |
|
2020-05-23 00:51:11 |
|
2017-11-04 09:23:43 |
|
2017-07-01 09:23:27 |
|
2017-01-11 13:25:28 |
|
2017-01-04 13:23:10 |
|
2016-12-29 13:20:14 |
|
2016-12-02 13:24:58 |
|
2016-11-29 00:26:14 |
|
2016-11-22 09:23:01 |
|
2016-11-19 00:24:08 |
|