{"id":"CVE-2016-4330","details":"In the HDF5 1.8.16 library's failure to check if the number of dimensions for an array read from the file is within the bounds of the space allocated for it, a heap-based buffer overflow will occur, potentially leading to arbitrary code execution.","modified":"2026-04-16T06:18:20.033768052Z","published":"2016-11-18T20:59:00.317Z","related":["openSUSE-SU-2018:1051-1","openSUSE-SU-2018:1056-1"],"references":[{"type":"WEB","url":"http://www.securityfocus.com/bid/94414"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201701-13"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3727"},{"type":"EVIDENCE","url":"http://www.talosintelligence.com/reports/TALOS-2016-0176/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/hdfgroup/hdf5","events":[{"introduced":"0"},{"last_affected":"28cd632b8d7a280b44cc4d2e18a01a0319d0275d"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"1.8.16"}]}}],"versions":["before_removing_docs","before_removing_fphdf5","before_removing_tbbt_code","before_signed_unsigned_changes","hdf5-1_0_0","hdf5-1_0_0-alpha2","hdf5-1_0_1","hdf5-1_2_0","hdf5-1_2_0-beta1-update2","hdf5-1_2_0beta","hdf5-1_2_1","hdf5-1_3_0","hdf5-1_3_1","hdf5-1_4_0","hdf5-1_4_1","hdf5-1_6_0","hdf5-1_6_1","hdf5-1_6_2","hdf5-1_8_0","hdf5-1_8_0-alpha2","hdf5-1_8_0-alpha3","hdf5-1_8_0-alpha4","hdf5-1_8_0-beta1","hdf5-1_8_0-beta2","hdf5-1_8_0-beta3","hdf5-1_8_0-beta4","hdf5-1_8_0-beta5","hdf5-1_8_1","hdf5-1_8_16","hdf5-1_8_2","hdf5-1_8_3","hdf5_1_8_15_precodefreeze_final_commit","proto1","r1_1beta1","vms_last_support_1_8"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-4330.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"}]}