Lucene search

K
fedoraFedoraFEDORA:35355309CD84
HistoryAug 18, 2021 - 1:17 a.m.

[SECURITY] Fedora 33 Update: hivex-1.3.21-1.fc33

2021-08-1801:17:27
lists.fedoraproject.org
14
fedora
update
hivex
windows
registry
library
hive files
unix
libguestfs
ocaml
perl
python
ruby

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

EPSS

0.002

Percentile

64.8%

Hive files are the undocumented binary files that Windows uses to store the Windows Registry on disk. Hivex is a library that can read and write to these files. ‘hivexsh’ is a shell you can use to interactively navigate a hive binary file. ‘hivexregedit’ (in perl-hivex) lets you export and merge to the textual regedit format. ‘hivexml’ can be used to convert a hive file to a more useful XML format. In order to get access to the hive files themselves, you can copy them from a Windows machine. They are usually found in %systemroot%\system32\config. For virtual machines we recommend using libguestfs or guestfish to copy out these files. libguestfs also provides a useful high-level tool called ‘virt-win-reg’ (based on hivex technology) which can be used to query specific registry keys in an existing Windows VM. For OCaml bindings, see ‘ocaml-hivex-devel’. For Perl bindings, see ‘perl-hivex’. For Python 3 bindings, see ‘python3-hivex’. For Ruby bindings, see ‘ruby-hivex’.

OSVersionArchitecturePackageVersionFilename
Fedora33anyhivex< 1.3.21UNKNOWN

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

EPSS

0.002

Percentile

64.8%