Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2019-8396

A buffer overflow in H5O__layout_encode in H5Olayout.c in the HDF HDF5 through 1.10.4 library allows attackers to cause a denial of service via a crafted HDF5 file. This issue was triggered while repacking an HDF5 file, aka "Invalid write of size 2."
Exploit prediction scoring system (EPSS) score
EPSS Score 0.003
EPSS Ranking 55.3%
CVSS Severity
CVSS v3 Score 6.5
CVSS v2 Score 4.3
Products affected by CVE-2019-8396
  • Hdfgroup » Hdf5 » Version: N/A
    cpe:2.3:a:hdfgroup:hdf5:-
  • Hdfgroup » Hdf5 » Version: 1.10.0
    cpe:2.3:a:hdfgroup:hdf5:1.10.0
  • Hdfgroup » Hdf5 » Version: 1.10.1
    cpe:2.3:a:hdfgroup:hdf5:1.10.1
  • Hdfgroup » Hdf5 » Version: 1.10.2
    cpe:2.3:a:hdfgroup:hdf5:1.10.2
  • Hdfgroup » Hdf5 » Version: 1.10.3
    cpe:2.3:a:hdfgroup:hdf5:1.10.3
  • Hdfgroup » Hdf5 » Version: 1.10.4
    cpe:2.3:a:hdfgroup:hdf5:1.10.4
  • Hdfgroup » Hdf5 » Version: 1.4.0
    cpe:2.3:a:hdfgroup:hdf5:1.4.0
  • Hdfgroup » Hdf5 » Version: 1.4.1
    cpe:2.3:a:hdfgroup:hdf5:1.4.1
  • Hdfgroup » Hdf5 » Version: 1.4.2
    cpe:2.3:a:hdfgroup:hdf5:1.4.2
  • Hdfgroup » Hdf5 » Version: 1.4.3
    cpe:2.3:a:hdfgroup:hdf5:1.4.3
  • Hdfgroup » Hdf5 » Version: 1.4.4
    cpe:2.3:a:hdfgroup:hdf5:1.4.4
  • Hdfgroup » Hdf5 » Version: 1.4.5
    cpe:2.3:a:hdfgroup:hdf5:1.4.5
  • Hdfgroup » Hdf5 » Version: 1.6.0
    cpe:2.3:a:hdfgroup:hdf5:1.6.0
  • Hdfgroup » Hdf5 » Version: 1.6.1
    cpe:2.3:a:hdfgroup:hdf5:1.6.1
  • Hdfgroup » Hdf5 » Version: 1.6.10
    cpe:2.3:a:hdfgroup:hdf5:1.6.10
  • Hdfgroup » Hdf5 » Version: 1.6.2
    cpe:2.3:a:hdfgroup:hdf5:1.6.2
  • Hdfgroup » Hdf5 » Version: 1.6.3
    cpe:2.3:a:hdfgroup:hdf5:1.6.3
  • Hdfgroup » Hdf5 » Version: 1.6.4
    cpe:2.3:a:hdfgroup:hdf5:1.6.4
  • Hdfgroup » Hdf5 » Version: 1.6.5
    cpe:2.3:a:hdfgroup:hdf5:1.6.5
  • Hdfgroup » Hdf5 » Version: 1.6.6
    cpe:2.3:a:hdfgroup:hdf5:1.6.6
  • Hdfgroup » Hdf5 » Version: 1.6.7
    cpe:2.3:a:hdfgroup:hdf5:1.6.7
  • Hdfgroup » Hdf5 » Version: 1.6.8
    cpe:2.3:a:hdfgroup:hdf5:1.6.8
  • Hdfgroup » Hdf5 » Version: 1.6.9
    cpe:2.3:a:hdfgroup:hdf5:1.6.9
  • Hdfgroup » Hdf5 » Version: 1.8.0
    cpe:2.3:a:hdfgroup:hdf5:1.8.0
  • Hdfgroup » Hdf5 » Version: 1.8.1
    cpe:2.3:a:hdfgroup:hdf5:1.8.1
  • Hdfgroup » Hdf5 » Version: 1.8.10
    cpe:2.3:a:hdfgroup:hdf5:1.8.10
  • Hdfgroup » Hdf5 » Version: 1.8.11
    cpe:2.3:a:hdfgroup:hdf5:1.8.11
  • Hdfgroup » Hdf5 » Version: 1.8.12
    cpe:2.3:a:hdfgroup:hdf5:1.8.12
  • Hdfgroup » Hdf5 » Version: 1.8.13
    cpe:2.3:a:hdfgroup:hdf5:1.8.13
  • Hdfgroup » Hdf5 » Version: 1.8.14
    cpe:2.3:a:hdfgroup:hdf5:1.8.14
  • Hdfgroup » Hdf5 » Version: 1.8.15
    cpe:2.3:a:hdfgroup:hdf5:1.8.15
  • Hdfgroup » Hdf5 » Version: 1.8.16
    cpe:2.3:a:hdfgroup:hdf5:1.8.16
  • Hdfgroup » Hdf5 » Version: 1.8.17
    cpe:2.3:a:hdfgroup:hdf5:1.8.17
  • Hdfgroup » Hdf5 » Version: 1.8.18
    cpe:2.3:a:hdfgroup:hdf5:1.8.18
  • Hdfgroup » Hdf5 » Version: 1.8.19
    cpe:2.3:a:hdfgroup:hdf5:1.8.19
  • Hdfgroup » Hdf5 » Version: 1.8.2
    cpe:2.3:a:hdfgroup:hdf5:1.8.2
  • Hdfgroup » Hdf5 » Version: 1.8.20
    cpe:2.3:a:hdfgroup:hdf5:1.8.20
  • Hdfgroup » Hdf5 » Version: 1.8.3
    cpe:2.3:a:hdfgroup:hdf5:1.8.3
  • Hdfgroup » Hdf5 » Version: 1.8.4
    cpe:2.3:a:hdfgroup:hdf5:1.8.4
  • Hdfgroup » Hdf5 » Version: 1.8.5
    cpe:2.3:a:hdfgroup:hdf5:1.8.5
  • Hdfgroup » Hdf5 » Version: 1.8.6
    cpe:2.3:a:hdfgroup:hdf5:1.8.6
  • Hdfgroup » Hdf5 » Version: 1.8.7
    cpe:2.3:a:hdfgroup:hdf5:1.8.7
  • Hdfgroup » Hdf5 » Version: 1.8.8
    cpe:2.3:a:hdfgroup:hdf5:1.8.8
  • Hdfgroup » Hdf5 » Version: 1.8.9
    cpe:2.3:a:hdfgroup:hdf5:1.8.9


Contact Us

Shodan ® - All rights reserved