5.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:N/A:P
5.4 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
5.5 Medium
AI Score
Confidence
High
0.002 Low
EPSS
Percentile
53.0%
Issue Overview:
A flaw was found in the hivex library. It is caused due to a lack of bounds check within the hivex_open function. An attacker could input a specially crafted Windows Registry (hive) file which would cause hivex to read memory beyond its normal bounds or cause the program to crash. The highest threat from this vulnerability is to system availability. (CVE-2021-3504)
Affected Packages:
hivex
Note:
This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update hivex to update your system.
New Packages:
aarch64:
hivex-1.3.10-6.11.amzn2.aarch64
hivex-devel-1.3.10-6.11.amzn2.aarch64
ocaml-hivex-1.3.10-6.11.amzn2.aarch64
ocaml-hivex-devel-1.3.10-6.11.amzn2.aarch64
perl-hivex-1.3.10-6.11.amzn2.aarch64
python-hivex-1.3.10-6.11.amzn2.aarch64
ruby-hivex-1.3.10-6.11.amzn2.aarch64
hivex-debuginfo-1.3.10-6.11.amzn2.aarch64
i686:
hivex-1.3.10-6.11.amzn2.i686
hivex-devel-1.3.10-6.11.amzn2.i686
ocaml-hivex-1.3.10-6.11.amzn2.i686
ocaml-hivex-devel-1.3.10-6.11.amzn2.i686
perl-hivex-1.3.10-6.11.amzn2.i686
python-hivex-1.3.10-6.11.amzn2.i686
ruby-hivex-1.3.10-6.11.amzn2.i686
hivex-debuginfo-1.3.10-6.11.amzn2.i686
src:
hivex-1.3.10-6.11.amzn2.src
x86_64:
hivex-1.3.10-6.11.amzn2.x86_64
hivex-devel-1.3.10-6.11.amzn2.x86_64
ocaml-hivex-1.3.10-6.11.amzn2.x86_64
ocaml-hivex-devel-1.3.10-6.11.amzn2.x86_64
perl-hivex-1.3.10-6.11.amzn2.x86_64
python-hivex-1.3.10-6.11.amzn2.x86_64
ruby-hivex-1.3.10-6.11.amzn2.x86_64
hivex-debuginfo-1.3.10-6.11.amzn2.x86_64
Red Hat: CVE-2021-3504
Mitre: CVE-2021-3504
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 2 | aarch64 | hivex | < 1.3.10-6.11.amzn2 | hivex-1.3.10-6.11.amzn2.aarch64.rpm |
Amazon Linux | 2 | aarch64 | hivex-devel | < 1.3.10-6.11.amzn2 | hivex-devel-1.3.10-6.11.amzn2.aarch64.rpm |
Amazon Linux | 2 | aarch64 | ocaml-hivex | < 1.3.10-6.11.amzn2 | ocaml-hivex-1.3.10-6.11.amzn2.aarch64.rpm |
Amazon Linux | 2 | aarch64 | ocaml-hivex-devel | < 1.3.10-6.11.amzn2 | ocaml-hivex-devel-1.3.10-6.11.amzn2.aarch64.rpm |
Amazon Linux | 2 | aarch64 | perl-hivex | < 1.3.10-6.11.amzn2 | perl-hivex-1.3.10-6.11.amzn2.aarch64.rpm |
Amazon Linux | 2 | aarch64 | python-hivex | < 1.3.10-6.11.amzn2 | python-hivex-1.3.10-6.11.amzn2.aarch64.rpm |
Amazon Linux | 2 | aarch64 | ruby-hivex | < 1.3.10-6.11.amzn2 | ruby-hivex-1.3.10-6.11.amzn2.aarch64.rpm |
Amazon Linux | 2 | aarch64 | hivex-debuginfo | < 1.3.10-6.11.amzn2 | hivex-debuginfo-1.3.10-6.11.amzn2.aarch64.rpm |
Amazon Linux | 2 | i686 | hivex | < 1.3.10-6.11.amzn2 | hivex-1.3.10-6.11.amzn2.i686.rpm |
Amazon Linux | 2 | i686 | hivex-devel | < 1.3.10-6.11.amzn2 | hivex-devel-1.3.10-6.11.amzn2.i686.rpm |
5.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:N/A:P
5.4 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
5.5 Medium
AI Score
Confidence
High
0.002 Low
EPSS
Percentile
53.0%