First published: Tue Nov 25 2014(Updated: )
It was reported that hivex [1], a library that can read and write hive files (undocumented binary files that Windows uses to store the Windows Registry on disk), did not properly handle small-sized hive files. An attacker able to supply a hive file of a small size to an application using the hivex library could use this flaw to read, and possibly write, up to 4095 bytes beyond the end of the allocated buffer, potentially resulting in arbitrary code execution with the with the privileges of the user running that application. This issue has been fixed in upstream version 3.11 of hivex. Upstream patches are available at: <a href="https://github.com/libguestfs/hivex/commit/357f26fa64fd1d9ccac2331fe174a8ee9c607adb">https://github.com/libguestfs/hivex/commit/357f26fa64fd1d9ccac2331fe174a8ee9c607adb</a> <a href="https://github.com/libguestfs/hivex/commit/4bbdf555f88baeae0fa804a369a81a83908bd705">https://github.com/libguestfs/hivex/commit/4bbdf555f88baeae0fa804a369a81a83908bd705</a> Reproducer: <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED ERRATA - CVE-2014-9273 hivex: missing checks for small-sized files [rhel-7.1]" href="show_bug.cgi?id=1158992#c0">https://bugzilla.redhat.com/show_bug.cgi?id=1158992#c0</a> [1] <a href="https://www.redhat.com/archives/libguestfs/2014-October/msg00235.html">https://www.redhat.com/archives/libguestfs/2014-October/msg00235.html</a> Acknowledgements: Red Hat would like to thank Mahmoud Al-Qudsi of NeoSmart Technologies for reporting this issue.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/hivex | <1.3.11 | 1.3.11 |
SUSE Linux | =13.1 | |
SUSE Linux | =13.2 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux HPC Node | =6.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
Red Hat Enterprise Linux Workstation | =7.0 | |
Debian Hivex | <=1.3.10-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9273 has a medium severity rating due to its potential for exploitation via specially crafted hive files.
To fix CVE-2014-9273, upgrade the hivex library to version 1.3.11 or later.
CVE-2014-9273 affects various versions of the hivex library across Red Hat and openSUSE distributions.
CVE-2014-9273 can enable attackers to cause denial of service or potentially execute arbitrary code by providing malformed hive files.
There is no official workaround for CVE-2014-9273; updating to a safe version is the recommended approach.