4.3
CVSSv3

CVE-2021-3622

Published: 23/12/2021 Updated: 07/11/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 4.3 | Impact Score: 1.4 | Exploitability Score: 2.8
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

A flaw was found in the hivex library. This flaw allows an malicious user to input a specially crafted Windows Registry (hive) file, which would cause hivex to recursively call the _get_children() function, leading to a stack overflow. The highest threat from this vulnerability is to system availability.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

redhat hivex

redhat enterprise linux workstation 7.0

redhat enterprise linux 7.0

redhat enterprise linux 6.0

redhat enterprise linux 8.0

fedoraproject fedora 33

fedoraproject fedora 34

Vendor Advisories

Synopsis Moderate: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for the virt:rhel and virt-devel:rhel modules is now available for Red Ha ...
Debian Bug report logs - #991860 hivex: CVE-2021-3622 Package: src:hivex; Maintainer for src:hivex is Debian Libvirt Maintainers <pkg-libvirt-maintainers@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Tue, 3 Aug 2021 17:15:02 UTC Severity: important Tags: security, upstream Fo ...
A flaw was found in the hivex library This flaw allows an attacker to input a specially crafted Windows Registry (hive) file, which would cause hivex to recursively call the _get_children() function, leading to a stack overflow The highest threat from this vulnerability is to system availability (CVE-2021-3622) ...
A security issue was found in the hivex library before version 1321 An attacker could input a specially crafted Windows Registry (hive) file which would cause hivex to recursively call the _get_children() function, ultimately leading to a stack overflow ...