CVE-2014-9273

lib/handle.c in Hivex before 1.3.11 allows local users to execute arbitrary code and gain privileges via a small hive files, which triggers an out-of-bounds read or write.
References
Link Resource
http://lists.opensuse.org/opensuse-updates/2015-02/msg00005.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2015-0301.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2015-1378.html Third Party Advisory
http://secunia.com/advisories/62792
http://www.openwall.com/lists/oss-security/2014/11/25/6 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2014/12/04/14 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/71279
https://bugzilla.redhat.com/show_bug.cgi?id=1167756 Issue Tracking
https://github.com/libguestfs/hivex/commit/357f26fa64fd1d9ccac2331fe174a8ee9c607adb Exploit Issue Tracking Patch
https://github.com/libguestfs/hivex/commit/4bbdf555f88baeae0fa804a369a81a83908bd705 Exploit Issue Tracking Patch
https://security.gentoo.org/glsa/201503-07
https://www.redhat.com/archives/libguestfs/2014-October/msg00235.html Vendor Advisory
http://lists.opensuse.org/opensuse-updates/2015-02/msg00005.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2015-0301.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2015-1378.html Third Party Advisory
http://secunia.com/advisories/62792
http://www.openwall.com/lists/oss-security/2014/11/25/6 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2014/12/04/14 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/71279
https://bugzilla.redhat.com/show_bug.cgi?id=1167756 Issue Tracking
https://github.com/libguestfs/hivex/commit/357f26fa64fd1d9ccac2331fe174a8ee9c607adb Exploit Issue Tracking Patch
https://github.com/libguestfs/hivex/commit/4bbdf555f88baeae0fa804a369a81a83908bd705 Exploit Issue Tracking Patch
https://security.gentoo.org/glsa/201503-07
https://www.redhat.com/archives/libguestfs/2014-October/msg00235.html Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:a:debian:hivex:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:20

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-updates/2015-02/msg00005.html - Third Party Advisory () http://lists.opensuse.org/opensuse-updates/2015-02/msg00005.html - Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2015-0301.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2015-0301.html - Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2015-1378.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2015-1378.html - Third Party Advisory
References () http://secunia.com/advisories/62792 - () http://secunia.com/advisories/62792 -
References () http://www.openwall.com/lists/oss-security/2014/11/25/6 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2014/11/25/6 - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2014/12/04/14 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2014/12/04/14 - Mailing List, Third Party Advisory
References () http://www.securityfocus.com/bid/71279 - () http://www.securityfocus.com/bid/71279 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=1167756 - Issue Tracking () https://bugzilla.redhat.com/show_bug.cgi?id=1167756 - Issue Tracking
References () https://github.com/libguestfs/hivex/commit/357f26fa64fd1d9ccac2331fe174a8ee9c607adb - Exploit, Patch, Issue Tracking () https://github.com/libguestfs/hivex/commit/357f26fa64fd1d9ccac2331fe174a8ee9c607adb - Exploit, Issue Tracking, Patch
References () https://github.com/libguestfs/hivex/commit/4bbdf555f88baeae0fa804a369a81a83908bd705 - Exploit, Patch, Issue Tracking () https://github.com/libguestfs/hivex/commit/4bbdf555f88baeae0fa804a369a81a83908bd705 - Exploit, Issue Tracking, Patch
References () https://security.gentoo.org/glsa/201503-07 - () https://security.gentoo.org/glsa/201503-07 -
References () https://www.redhat.com/archives/libguestfs/2014-October/msg00235.html - Vendor Advisory () https://www.redhat.com/archives/libguestfs/2014-October/msg00235.html - Vendor Advisory

Information

Published : 2014-12-08 16:59

Updated : 2024-11-21 02:20


NVD link : CVE-2014-9273

Mitre link : CVE-2014-9273

CVE.ORG link : CVE-2014-9273


JSON object : View

Products Affected

redhat

  • enterprise_linux_workstation
  • enterprise_linux_server
  • enterprise_linux_desktop
  • enterprise_linux_hpc_node

debian

  • hivex

opensuse

  • opensuse
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer