Home

Description

A vulnerability was identified in OSGeo gdal up to 3.13.0dev-4. This issue affects the function SWnentries of the file frmts/hdf4/hdf-eos/SWapi.c. Such manipulation of the argument DimensionName leads to heap-based buffer overflow. The attack must be carried out locally. The exploit is publicly available and might be used. Upgrading to version 3.12.4RC1 is capable of addressing this issue. The name of the patch is 9491e794f1757f08063ea2f7a274ad2994afa636. It is advisable to upgrade the affected component.

PUBLISHED Reserved 2026-05-07 | Published 2026-05-07 | Updated 2026-05-07 | Assigner VulDB




MEDIUM: 4.8CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
MEDIUM: 5.3CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
MEDIUM: 5.3CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
4.3AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C

Problem types

Heap-based Buffer Overflow

Memory Corruption

Product status

3.13.0dev-4
affected

3.12.4RC1
unaffected

Timeline

2026-05-07:Advisory disclosed
2026-05-07:VulDB entry created
2026-05-07:VulDB entry last update

Credits

biniam (VulDB User) reporter

References

vuldb.com/submit/808038 exploit

github.com/OSGeo/gdal/issues/14356 exploit

vuldb.com/vuln/361839 (VDB-361839 | OSGeo gdal SWapi.c SWnentries heap-based overflow) vdb-entry technical-description

vuldb.com/vuln/361839/cti (VDB-361839 | CTI Indicators (IOB, IOC, IOA)) signature permissions-required

vuldb.com/submit/808038 (Submit #808038 | OSGeo GDAL 3.13.0dev Heap-based Buffer Overflow) third-party-advisory

github.com/OSGeo/gdal/issues/14356 issue-tracking

github.com/OSGeo/gdal/pull/14361 issue-tracking patch

github.com/biniamf/pocs/tree/main/gdal-swinqdims_bof exploit

github.com/...ommit/9491e794f1757f08063ea2f7a274ad2994afa636 patch

github.com/OSGeo/gdal/releases/tag/v3.12.4RC1 patch

github.com/OSGeo/gdal/ product

cve.org (CVE-2026-8086)

nvd.nist.gov (CVE-2026-8086)

Download JSON