CVE-2025-14935

NameCVE-2025-14935
DescriptionNSF Unidata NetCDF-C Dimension Name Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of NSF Unidata NetCDF-C. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of dimension names. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-27168.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1123960, 1123961

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
netcdf (PTS)bullseye1:4.7.4-1vulnerable
bookworm1:4.9.0-3vulnerable
forky, sid, trixie1:4.9.3-1vulnerable
netcdf-parallel (PTS)bullseye1:4.7.4-1vulnerable
bookworm1:4.9.0-1vulnerable
forky, sid, trixie1:4.9.3-2vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
netcdfsource(unstable)(unfixed)1123960
netcdf-parallelsource(unstable)(unfixed)1123961

Notes

https://www.zerodayinitiative.com/advisories/ZDI-25-1154/

Search for package or bug name: Reporting problems