ID CVE-2018-17433
Summary A heap-based buffer overflow in ReadGifImageDesc() in gifread.c in the HDF HDF5 through 1.10.3 library allows attackers to cause a denial of service via a crafted HDF5 file. This issue was triggered while converting a GIF file to an HDF file.
References
Vulnerable Configurations
  • cpe:2.3:a:hdfgroup:hdf5:1.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.4.3:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.4.3:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.4.4:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.4.4:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.4.5:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.4.5:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.6.2:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.6.2:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.6.3:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.6.3:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.6.4:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.6.4:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.6.5:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.6.5:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.6.6:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.6.6:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.6.7:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.6.7:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.6.8:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.6.8:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.6.9:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.6.9:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.6.10:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.6.10:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.8.0:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.8.0:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.8.1:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.8.1:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.8.2:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.8.2:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.8.3:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.8.3:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.8.4:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.8.4:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.8.5:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.8.5:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.8.6:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.8.6:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.8.7:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.8.7:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.8.8:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.8.8:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.8.9:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.8.9:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.8.10:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.8.10:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.8.11:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.8.11:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.8.12:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.8.12:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.8.13:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.8.13:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.8.14:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.8.14:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.8.15:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.8.15:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.8.16:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.8.16:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.8.17:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.8.17:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.8.18:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.8.18:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.8.19:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.8.19:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.8.20:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.8.20:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.10.0:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.10.0:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.10.1:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.10.1:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.10.2:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.10.2:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.10.3:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.10.3:*:*:*:*:*:*:*
CVSS
Base: 4.3 (as of 24-08-2020 - 17:37)
Impact:
Exploitability:
CWE CWE-787
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:M/Au:N/C:N/I:N/A:P
refmap via4
misc https://github.com/SegfaultMasters/covering360/tree/master/HDF5/vuln8#heap-overflow-in-readgifimagedesc
Last major update 24-08-2020 - 17:37
Published 24-09-2018 - 14:29
Last modified 24-08-2020 - 17:37
Back to Top