{"api_version":"1","generated_at":"2026-04-14T15:55:46+00:00","cve":"CVE-2016-4332","urls":{"html":"https://cve.report/CVE-2016-4332","api":"https://cve.report/api/cve/CVE-2016-4332.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2016-4332","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2016-4332"},"summary":{"title":"CVE-2016-4332","description":"The library's failure to check if certain message types support a particular flag, the HDF5 1.8.16 library will cast the structure to an alternative structure and then assign to fields that aren't supported by the message type and the library will write outside the bounds of the heap buffer. This can lead to code execution under the context of the library.","state":"PUBLIC","assigner":"cert@cert.org","published_at":"2016-11-18 20:59:00","updated_at":"2017-11-04 01:29:00"},"problem_types":["CWE-20"],"metrics":[],"references":[{"url":"http://www.talosintelligence.com/reports/TALOS-2016-0178/","name":"http://www.talosintelligence.com/reports/TALOS-2016-0178/","refsource":"MISC","tags":["Exploit","Technical Description","Third Party Advisory"],"title":"Cisco Talos - Talos 2016 0178","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/94417","name":"94417","refsource":"BID","tags":[],"title":"HDF5 CVE-2016-4332 Local Heap Overflow Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://security.gentoo.org/glsa/201701-13","name":"GLSA-201701-13","refsource":"GENTOO","tags":[],"title":"HDF5: Multiple vulnerabilities (GLSA 201701-13) — Gentoo security","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.debian.org/security/2016/dsa-3727","name":"DSA-3727","refsource":"DEBIAN","tags":[],"title":"Debian -- Security Information -- DSA-3727-1 hdf5","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2016-4332","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4332","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2016","cve_id":"4332","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"hdfgroup","cpe5":"hdf5","cpe6":"1.8.16","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"4332","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"hdfgroup","cpe5":"hdf5","cpe6":"1.8.16","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2016-4332","qid":"710480","title":"Gentoo Linux HDF5 Multiple Vulnerabilities (GLSA 201701-13)"},{"cve":"CVE-2016-4332","qid":"755807","title":"SUSE Enterprise Linux Security Update for hdf5 (SUSE-SU-2024:0538-1)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cert@cert.org","ID":"CVE-2016-4332","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The library's failure to check if certain message types support a particular flag, the HDF5 1.8.16 library will cast the structure to an alternative structure and then assign to fields that aren't supported by the message type and the library will write outside the bounds of the heap buffer. This can lead to code execution under the context of the library."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"94417","refsource":"BID","url":"http://www.securityfocus.com/bid/94417"},{"name":"GLSA-201701-13","refsource":"GENTOO","url":"https://security.gentoo.org/glsa/201701-13"},{"name":"DSA-3727","refsource":"DEBIAN","url":"http://www.debian.org/security/2016/dsa-3727"},{"name":"http://www.talosintelligence.com/reports/TALOS-2016-0178/","refsource":"MISC","url":"http://www.talosintelligence.com/reports/TALOS-2016-0178/"}]}},"nvd":{"publishedDate":"2016-11-18 20:59:00","lastModifiedDate":"2017-11-04 01:29:00","problem_types":["CWE-20"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.6,"baseSeverity":"HIGH"},"exploitabilityScore":1.8,"impactScore":6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:L/AC:M/Au:N/C:C/I:C/A:C","accessVector":"LOCAL","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE","baseScore":6.9},"severity":"MEDIUM","exploitabilityScore":3.4,"impactScore":10,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:hdfgroup:hdf5:1.8.16:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2016","CveId":"4332","Ordinal":"90255","Title":"CVE-2016-4332","CVE":"CVE-2016-4332","Year":"2016"},"notes":[{"CveYear":"2016","CveId":"4332","Ordinal":"1","NoteData":"The library's failure to check if certain message types support a particular flag, the HDF5 1.8.16 library will cast the structure to an alternative structure and then assign to fields that aren't supported by the message type and the library will write outside the bounds of the heap buffer. This can lead to code execution under the context of the library.","Type":"Description","Title":null},{"CveYear":"2016","CveId":"4332","Ordinal":"2","NoteData":"2016-11-18","Type":"Other","Title":"Published"},{"CveYear":"2016","CveId":"4332","Ordinal":"3","NoteData":"2017-11-03","Type":"Other","Title":"Modified"}]}}}