[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2021-3504Date: (C)2021-05-13   (M)2024-04-19


A flaw was found in the hivex library in versions before 1.3.20. It is caused due to a lack of bounds check within the hivex_open function. An attacker could input a specially crafted Windows Registry (hive) file which would cause hivex to read memory beyond its normal bounds or cause the program to crash. The highest threat from this vulnerability is to system availability.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 5.4CVSS Score : 5.8
Exploit Score: 2.8Exploit Score: 8.6
Impact Score: 2.5Impact Score: 4.9
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: NETWORKAccess Vector: NETWORK
Attack Complexity: LOWAccess Complexity: MEDIUM
Privileges Required: NONEAuthentication: NONE
User Interaction: REQUIREDConfidentiality: PARTIAL
Scope: UNCHANGEDIntegrity: NONE
Confidentiality: LOWAvailability: PARTIAL
Integrity: NONE 
Availability: LOW 
  
Reference:
FEDORA-2021-b71cc4df92
FEDORA-2021-da76643229
https://lists.debian.org/debian-lts-announce/2021/05/msg00011.html
https://bugzilla.redhat.com/show_bug.cgi?id=1949687

CPE    2
cpe:/o:debian:debian_linux:9.0
cpe:/o:redhat:enterprise_linux:7.0
CWE    1
CWE-125
OVAL    18
oval:org.secpod.oval:def:72080
oval:org.secpod.oval:def:506206
oval:org.secpod.oval:def:89044345
oval:org.secpod.oval:def:120213
...

© SecPod Technologies