{"api_version":"1","generated_at":"2026-04-23T07:00:57+00:00","cve":"CVE-2021-3504","urls":{"html":"https://cve.report/CVE-2021-3504","api":"https://cve.report/api/cve/CVE-2021-3504.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-3504","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-3504"},"summary":{"title":"CVE-2021-3504","description":"A flaw was found in the hivex library in versions before 1.3.20. It is caused due to a lack of bounds check within the hivex_open function. An attacker could input a specially crafted Windows Registry (hive) file which would cause hivex to read memory beyond its normal bounds or cause the program to crash. The highest threat from this vulnerability is to system availability.","state":"PUBLIC","assigner":"secalert@redhat.com","published_at":"2021-05-11 23:15:00","updated_at":"2023-11-07 03:38:00"},"problem_types":["CWE-125"],"metrics":[],"references":[{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A5BNKNVYFL36P2GBEB5O36LHFRYU575H/","name":"FEDORA-2021-b71cc4df92","refsource":"","tags":[],"title":"[SECURITY] Fedora 34 Update: hivex-1.3.20-1.fc34 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5BNKNVYFL36P2GBEB5O36LHFRYU575H/","name":"FEDORA-2021-b71cc4df92","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 34 Update: hivex-1.3.20-1.fc34 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BQXTEACRWYAZVNEOIWIYUFGG4GOXSQ22/","name":"FEDORA-2021-da76643229","refsource":"","tags":[],"title":"[SECURITY] Fedora 33 Update: hivex-1.3.20-1.fc33 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.debian.org/debian-lts-announce/2021/05/msg00011.html","name":"[debian-lts-announce] 20210511 [SECURITY] [DLA 2656-1] hivex security update","refsource":"MLIST","tags":[],"title":"[SECURITY] [DLA 2656-1] hivex security update","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BQXTEACRWYAZVNEOIWIYUFGG4GOXSQ22/","name":"FEDORA-2021-da76643229","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 33 Update: hivex-1.3.20-1.fc33 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1949687","name":"https://bugzilla.redhat.com/show_bug.cgi?id=1949687","refsource":"MISC","tags":[],"title":"1949687 – (CVE-2021-3504) CVE-2021-3504 hivex: Buffer overflow when provided invalid node key length","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-3504","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3504","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"3504","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"9.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"3504","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"34","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"3504","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"libguestfs","cpe5":"hivex","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"3504","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"3504","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"7.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"3504","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"8.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"3504","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"8.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"advanced_virtualization","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"3504","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"hivex","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2021-3504","qid":"159259","title":"Oracle Enterprise Linux Security Update for hivex (ELSA-2021-2318)"},{"cve":"CVE-2021-3504","qid":"159343","title":"Oracle Enterprise Linux Security Update for virt:ol and virt-devel:rhel (ELSA-2021-3061)"},{"cve":"CVE-2021-3504","qid":"178589","title":"Debian Security Update for hivex (DLA 2656-1)"},{"cve":"CVE-2021-3504","qid":"178615","title":"Debian Security Update for hivex (DSA 4913-1)"},{"cve":"CVE-2021-3504","qid":"178630","title":"Debian Security Update for hivex (DSA 4913-1)"},{"cve":"CVE-2021-3504","qid":"180238","title":"Debian Security Update for hivex (CVE-2021-3504)"},{"cve":"CVE-2021-3504","qid":"198572","title":"Ubuntu Security Notification for hivex Vulnerability (USN-5148-1)"},{"cve":"CVE-2021-3504","qid":"239402","title":"Red Hat Update for hivex (RHSA-2021:2318)"},{"cve":"CVE-2021-3504","qid":"239539","title":"Red Hat Update for virt:rhel and virt-devel:rhel (RHSA-2021:3061)"},{"cve":"CVE-2021-3504","qid":"257089","title":"CentOS Security Update for hivex (CESA-2021:2318)"},{"cve":"CVE-2021-3504","qid":"281208","title":"Fedora Security Update for hivex (FEDORA-2021-da76643229)"},{"cve":"CVE-2021-3504","qid":"281209","title":"Fedora Security Update for hivex (FEDORA-2021-b71cc4df92)"},{"cve":"CVE-2021-3504","qid":"352398","title":"Amazon Linux Security Advisory for hivex: ALAS2-2021-1658"},{"cve":"CVE-2021-3504","qid":"377227","title":"Alibaba Cloud Linux Security Update for hivex (ALINUX2-SA-2021:0034)"},{"cve":"CVE-2021-3504","qid":"377346","title":"Alibaba Cloud Linux Security Update for virt:rhel and virt-devel:rhel (ALINUX3-SA-2021:0058)"},{"cve":"CVE-2021-3504","qid":"501580","title":"Alpine Linux Security Update for hivex"},{"cve":"CVE-2021-3504","qid":"501866","title":"Alpine Linux Security Update for hivex"},{"cve":"CVE-2021-3504","qid":"670539","title":"EulerOS Security Update for hivex (EulerOS-SA-2021-2297)"},{"cve":"CVE-2021-3504","qid":"670574","title":"EulerOS Security Update for hivex (EulerOS-SA-2021-2332)"},{"cve":"CVE-2021-3504","qid":"670622","title":"EulerOS Security Update for hivex (EulerOS-SA-2021-2380)"},{"cve":"CVE-2021-3504","qid":"750035","title":"SUSE Enterprise Linux Security Update for hivex (SUSE-SU-2021:1761-1)"},{"cve":"CVE-2021-3504","qid":"750036","title":"SUSE Enterprise Linux Security Update for hivex (SUSE-SU-2021:1760-1)"},{"cve":"CVE-2021-3504","qid":"750041","title":"SUSE Enterprise Linux Security Update for hivex (SUSE-SU-2021:1761-1)"},{"cve":"CVE-2021-3504","qid":"750042","title":"SUSE Enterprise Linux Security Update for hivex (SUSE-SU-2021:1760-1)"},{"cve":"CVE-2021-3504","qid":"750073","title":"SUSE Enterprise Linux Security Update for hivex (SUSE-SU-2021:1761-1)"},{"cve":"CVE-2021-3504","qid":"750187","title":"OpenSUSE Security Update for hivex (openSUSE-SU-2021:0806-1)"},{"cve":"CVE-2021-3504","qid":"750761","title":"OpenSUSE Security Update for hivex (openSUSE-SU-2021:1761-1)"},{"cve":"CVE-2021-3504","qid":"901206","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for hivex (6472)"},{"cve":"CVE-2021-3504","qid":"902325","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for hivex (6472-1)"},{"cve":"CVE-2021-3504","qid":"940064","title":"AlmaLinux Security Update for virt:rhel and virt-devel:rhel (ALSA-2021:3061)"},{"cve":"CVE-2021-3504","qid":"960072","title":"Rocky Linux Security Update for virt:rhel and virt-devel:rhel (RLSA-2021:3061)"}]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2021-3504","ASSIGNER":"secalert@redhat.com","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"hivex","version":{"version_data":[{"version_value":"hivex-1.3.20"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-125"}]}]},"references":{"reference_data":[{"refsource":"MISC","name":"https://bugzilla.redhat.com/show_bug.cgi?id=1949687","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1949687"},{"refsource":"MLIST","name":"[debian-lts-announce] 20210511 [SECURITY] [DLA 2656-1] hivex security update","url":"https://lists.debian.org/debian-lts-announce/2021/05/msg00011.html"},{"refsource":"FEDORA","name":"FEDORA-2021-b71cc4df92","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5BNKNVYFL36P2GBEB5O36LHFRYU575H/"},{"refsource":"FEDORA","name":"FEDORA-2021-da76643229","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BQXTEACRWYAZVNEOIWIYUFGG4GOXSQ22/"}]},"description":{"description_data":[{"lang":"eng","value":"A flaw was found in the hivex library in versions before 1.3.20. It is caused due to a lack of bounds check within the hivex_open function. An attacker could input a specially crafted Windows Registry (hive) file which would cause hivex to read memory beyond its normal bounds or cause the program to crash. The highest threat from this vulnerability is to system availability."}]}},"nvd":{"publishedDate":"2021-05-11 23:15:00","lastModifiedDate":"2023-11-07 03:38:00","problem_types":["CWE-125"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"LOW","baseScore":5.4,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":2.5},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:N/A:P","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"PARTIAL","baseScore":5.8},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:hivex:*:*:*:*:*:*:*:*","versionEndExcluding":"1.3.20","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:advanced_virtualization:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"3504","Ordinal":"206705","Title":"CVE-2021-3504","CVE":"CVE-2021-3504","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"3504","Ordinal":"1","NoteData":"A flaw was found in the hivex library in versions before 1.3.20. It is caused due to a lack of bounds check within the hivex_open function. An attacker could input a specially crafted Windows Registry (hive) file which would cause hivex to read memory beyond its normal bounds or cause the program to crash. The highest threat from this vulnerability is to system availability.","Type":"Description","Title":null},{"CveYear":"2021","CveId":"3504","Ordinal":"2","NoteData":"2021-05-11","Type":"Other","Title":"Published"},{"CveYear":"2021","CveId":"3504","Ordinal":"3","NoteData":"2021-05-18","Type":"Other","Title":"Modified"}]}}}