Heap-Based Buffer Overflow in OSGeo GDAL Software
CVE-2026-8212
Key Information:
Badges
What is CVE-2026-8212?
A vulnerability has been identified in OSGeo GDAL software versions up to 3.13.0dev-4, specifically within the SWSDfldsrch function in the SWapi.c file. A successful exploit could result in a heap-based buffer overflow, which may allow an attacker with local access to execute arbitrary code or manipulate the software's behavior. This serious flaw necessitates immediate attention; users are encouraged to upgrade to version 3.13.0RC1, which includes the necessary patch (commit ID 3e04c0385630e4d42517046d9a4967dfccfeb7fd) to mitigate this issue.
Affected Version(s)
gdal 3.13.0dev-4
gdal 3.13.0RC1
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
