CVE-2019-25050 – gdal
Package
Manager: pip
Name: gdal
Vulnerable Version: =2.4.2 || =2.4.3 || =2.4.4 || =3.0.0 || =3.0.1 || =3.0.2 || =3.0.3 || =3.0.4 || >=0 <767e3a56144f676ca738ef8f700e0e56035bd05a || >=2.4.2 <3.1.0
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00129 pctl0.33206
Details
netCDF in GDAL 2.4.2 through 3.0.4 has a stack-based buffer overflow in nc4_get_att (called from nc4_get_att_tc and nc_get_att_text) and in uffd_cleanup (called from netCDFDataset::~netCDFDataset and netCDFDataset::~netCDFDataset).
Metadata
Created: 2021-07-20T07:15:00Z
Modified: 2024-11-21T14:57:32.273602Z
Source: https://osv-vulnerabilities
CWE IDs: N/A
Alternative ID: N/A
Finding: F316
Auto approve: 1