CVE-2025-6269
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-06-19

Last updated on: 2026-04-29

Assigner: VulDB

Description
A vulnerability classified as critical was found in HDF5 up to 1.14.6. Affected by this vulnerability is the function H5C__reconstruct_cache_entry of the file H5Cimage.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-19
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2025-06-19
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
hdfgroup hdf5 to 1.14.6 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-122 A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().
CWE-119 The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-6269 is a heap-based buffer overflow vulnerability in the HDF5 library (up to version 1.14.6), specifically in the function H5C__reconstruct_cache_entry within the source file H5Cimage.c. The vulnerability occurs due to improper handling of buffer sizes or incorrect assumptions about data layout when reconstructing cache entries from image data, leading to out-of-bounds memory access beyond the allocated heap buffer. This can cause memory corruption or crashes when processing HDF5 image cache entries. Exploitation requires local access and involves crafted HDF5 files that trigger the overflow during cache image reconstruction. [1, 2]


How can this vulnerability impact me? :

This vulnerability can lead to memory corruption or crashes in applications using the HDF5 library when processing specially crafted HDF5 files. Since it is a heap-based buffer overflow, it may allow an attacker with local access to cause denial of service or potentially execute arbitrary code, compromising the stability and security of systems relying on HDF5 for managing large scientific data. [1, 2]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by using fuzz testing tools with AddressSanitizer (ASAN) to identify out-of-bounds memory accesses during the reconstruction of cache entries in HDF5. Specifically, running the `h5_extended_fuzzer` with ASAN enabled can help detect the heap-based buffer overflow in the function `H5C__reconstruct_cache_entry`. There are no network detection commands since the attack requires local access. Example command to run the fuzzer with ASAN might be: `ASAN_OPTIONS=detect_stack_use_after_return=1 ./h5_extended_fuzzer`. [1, 2]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include avoiding the use of vulnerable HDF5 versions up to 1.14.6, especially when processing untrusted or crafted HDF5 files. Since the vulnerability requires local access, restrict local user permissions to prevent untrusted users from exploiting the flaw. Monitor for updates from the HDF Group and apply patches or upgrade to a fixed version once available. Additionally, consider running HDF5 operations in a sandboxed environment to limit potential impact. [2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart