{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-8212","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-05-09T07:09:13.290Z","datePublished":"2026-05-09T22:30:12.527Z","dateUpdated":"2026-05-11T14:56:32.914Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-05-09T22:30:12.527Z"},"title":"OSGeo gdal SWapi.c SWSDfldsrch heap-based overflow","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-122","lang":"en","description":"Heap-based Buffer Overflow"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-119","lang":"en","description":"Memory Corruption"}]}],"affected":[{"vendor":"OSGeo","product":"gdal","versions":[{"version":"3.13.0dev-4","status":"affected"},{"version":"3.13.0RC1","status":"unaffected"}],"cpes":["cpe:2.3:a:osgeo:gdal:*:*:*:*:*:*:*:*"]}],"descriptions":[{"lang":"en","value":"A flaw has been found in OSGeo gdal up to 3.13.0dev-4. Affected by this vulnerability is the function SWSDfldsrch of the file frmts/hdf4/hdf-eos/SWapi.c. Executing a manipulation can lead to heap-based buffer overflow. The attack requires local access. The exploit has been published and may be used. Upgrading to version 3.13.0RC1 addresses this issue. This patch is called 3e04c0385630e4d42517046d9a4967dfccfeb7fd. The affected component should be upgraded."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":4.8,"vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":5.3,"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":5.3,"vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":4.3,"vectorString":"AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C"}}],"timeline":[{"time":"2026-05-09T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-05-09T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-05-09T09:14:31.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"biniam (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/vuln/362429","name":"VDB-362429 | OSGeo gdal SWapi.c SWSDfldsrch heap-based overflow","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/vuln/362429/cti","name":"VDB-362429 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/submit/808127","name":"Submit #808127 | OSGeo GDAL 3.13.0dev Out-of-Bounds Read","tags":["third-party-advisory"]},{"url":"https://github.com/OSGeo/gdal/issues/14398","tags":["issue-tracking"]},{"url":"https://github.com/biniamf/pocs/tree/main/gdal-swsdfldsrch_oob-read","tags":["exploit"]},{"url":"https://github.com/OSGeo/gdal/commit/3e04c0385630e4d42517046d9a4967dfccfeb7fd","tags":["patch"]},{"url":"https://github.com/OSGeo/gdal/releases/tag/v3.13.0RC1","tags":["patch"]},{"url":"https://github.com/OSGeo/gdal/","tags":["product"]}],"tags":["x_open-source"]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-05-11T14:56:25.255773Z","id":"CVE-2026-8212","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-05-11T14:56:32.914Z"}}]}}