CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
AI Score
Confidence
Low
EPSS
Percentile
87.8%
Stack-based buffer overflow in the Read32s_64 function in src/lib/cdfread64.c in the NASA Goddard Space Flight Center Common Data Format (CDF) library before 3.2.1 allows context-dependent attackers to execute arbitrary code via a .cdf file with crafted length tags.
Vendor | Product | Version | CPE |
---|---|---|---|
nasa_goddard_space_flight_center | common_data_format | * | cpe:2.3:a:nasa_goddard_space_flight_center:common_data_format:*:*:*:*:*:*:*:* |
nasa_goddard_space_flight_center | common_data_format | 2.0 | cpe:2.3:a:nasa_goddard_space_flight_center:common_data_format:2.0:*:*:*:*:*:*:* |
nasa_goddard_space_flight_center | common_data_format | 2.1 | cpe:2.3:a:nasa_goddard_space_flight_center:common_data_format:2.1:*:*:*:*:*:*:* |
nasa_goddard_space_flight_center | common_data_format | 2.2 | cpe:2.3:a:nasa_goddard_space_flight_center:common_data_format:2.2:*:*:*:*:*:*:* |
nasa_goddard_space_flight_center | common_data_format | 2.3 | cpe:2.3:a:nasa_goddard_space_flight_center:common_data_format:2.3:*:*:*:*:*:*:* |
nasa_goddard_space_flight_center | common_data_format | 2.4 | cpe:2.3:a:nasa_goddard_space_flight_center:common_data_format:2.4:*:*:*:*:*:*:* |
nasa_goddard_space_flight_center | common_data_format | 2.5 | cpe:2.3:a:nasa_goddard_space_flight_center:common_data_format:2.5:*:*:*:*:*:*:* |
nasa_goddard_space_flight_center | common_data_format | 2.6 | cpe:2.3:a:nasa_goddard_space_flight_center:common_data_format:2.6:*:*:*:*:*:*:* |
nasa_goddard_space_flight_center | common_data_format | 2.7 | cpe:2.3:a:nasa_goddard_space_flight_center:common_data_format:2.7:*:*:*:*:*:*:* |
nasa_goddard_space_flight_center | common_data_format | 3.0 | cpe:2.3:a:nasa_goddard_space_flight_center:common_data_format:3.0:*:*:*:*:*:*:* |
cdf.gsfc.nasa.gov/CDF32_buffer_overflow.html
secunia.com/advisories/30053
secunia.com/advisories/30169
security.gentoo.org/glsa/glsa-200805-14.xml
www.coresecurity.com/?action=item&id=2260
www.securityfocus.com/bid/29045
www.securitytracker.com/id?1019965
www.vupen.com/english/advisories/2008/1440/references
exchange.xforce.ibmcloud.com/vulnerabilities/42219