Gentoo Logo

Common Data Format library: User-assisted execution of arbitrary code


1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200805-14 / cdf
Release Date May 13, 2008
Latest Revision May 13, 2008: 01
Impact normal
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
sci-libs/cdf < 3.2.1 >= 3.2.1 All supported architectures

Related bugreports: #220391


A buffer overflow vulnerability has been discovered in the Common Data Format library.

2.  Impact Information


The Common Data Format library is a scientific data management package which allows programmers and application developers to manage and manipulate scalar, vector, and multi-dimensional data arrays in a platform independent fashion.


Alfredo Ortega (Core Security Technologies) reported a boundary error within the Read32s_64() function when processing CDF files.


A remote attacker could entice a user to open a specially crafted CDF file, possibly resulting in the remote execution of arbitrary code with the privileges of the user running the application.

3.  Resolution Information


There is no known workaround at this time.


All Common Data Format library users should upgrade to the latest version:

Code Listing 3.1: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose ">=sci-libs/cdf-3.2.1"

4.  References


Page updated May 13, 2008

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2015 Gentoo Foundation, Inc. Questions, Comments? Contact us.