ID CVE-2020-10809
Summary An issue was discovered in HDF5 through 1.12.0. A heap-based buffer overflow exists in the function Decompress() located in decompress.c. It can be triggered by sending a crafted file to the gif2h5 binary. It allows an attacker to cause Denial of Service.
References
Vulnerable Configurations
  • cpe:2.3:a:hdfgroup:hdf5:1.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.4.3:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.4.3:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.4.4:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.4.4:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.4.5:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.4.5:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.6.2:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.6.2:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.6.3:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.6.3:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.6.4:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.6.4:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.6.5:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.6.5:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.6.6:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.6.6:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.6.7:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.6.7:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.6.8:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.6.8:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.6.9:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.6.9:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.6.10:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.6.10:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.8.0:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.8.0:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.8.1:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.8.1:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.8.2:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.8.2:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.8.3:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.8.3:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.8.4:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.8.4:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.8.5:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.8.5:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.8.6:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.8.6:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.8.7:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.8.7:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.8.8:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.8.8:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.8.9:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.8.9:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.8.10:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.8.10:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.8.11:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.8.11:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.8.12:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.8.12:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.8.13:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.8.13:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.8.14:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.8.14:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.8.15:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.8.15:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.8.16:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.8.16:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.8.17:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.8.17:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.8.18:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.8.18:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.8.19:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.8.19:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.8.20:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.8.20:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.10.0:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.10.0:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.10.1:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.10.1:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.10.2:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.10.2:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.10.3:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.10.3:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.10.4:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.10.4:*:*:*:*:*:*:*
  • cpe:2.3:a:hdfgroup:hdf5:1.12.0:*:*:*:*:*:*:*
    cpe:2.3:a:hdfgroup:hdf5:1.12.0:*:*:*:*:*:*:*
CVSS
Base: 4.3 (as of 30-04-2020 - 13:22)
Impact:
Exploitability:
CWE CWE-787
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:M/Au:N/C:N/I:N/A:P
refmap via4
misc
Last major update 30-04-2020 - 13:22
Published 22-03-2020 - 18:15
Last modified 30-04-2020 - 13:22
Back to Top