CVE-2021-3622

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-3622
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-3622.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2021-3622
Downstream
Related
Published
2021-12-23T21:15:08Z
Modified
2025-10-15T13:07:19.776478Z
Severity
  • 4.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L CVSS Calculator
Summary
[none]
Details

A flaw was found in the hivex library. This flaw allows an attacker to input a specially crafted Windows Registry (hive) file, which would cause hivex to recursively call the getchildren() function, leading to a stack overflow. The highest threat from this vulnerability is to system availability.

References

Affected packages

Git / github.com/libguestfs/hivex

Affected ranges

Type
GIT
Repo
https://github.com/libguestfs/hivex
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

1.*

1.1.0
1.1.1
1.1.2
1.2.0
1.2.1
1.2.2
1.2.3
1.2.4
1.2.5
1.2.6
1.2.7
1.2.8
1.3.0
1.3.1
1.3.10
1.3.11
1.3.12
1.3.13
1.3.19
1.3.2
1.3.3
1.3.4
1.3.5
1.3.6
1.3.7
1.3.8
1.3.9

v1.*

v1.3.14
v1.3.15
v1.3.16
v1.3.17
v1.3.18
v1.3.19
v1.3.20

Database specific

vanir_signatures

[
    {
        "signature_type": "Function",
        "deprecated": false,
        "source": "https://github.com/libguestfs/hivex/commit/771728218dac2fbf6997a7e53225e75a4c6b7255",
        "signature_version": "v1",
        "target": {
            "function": "_get_children",
            "file": "lib/node.c"
        },
        "digest": {
            "function_hash": "138394577735161663126852814952112072419",
            "length": 2324.0
        },
        "id": "CVE-2021-3622-066ab8c3"
    },
    {
        "signature_type": "Line",
        "deprecated": false,
        "source": "https://github.com/libguestfs/hivex/commit/771728218dac2fbf6997a7e53225e75a4c6b7255",
        "signature_version": "v1",
        "target": {
            "file": "lib/node.c"
        },
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "74309310395030575337290169571303175705",
                "233451100487387596963065481564458646252",
                "87209965537219425312944453589324538996",
                "75759970310467413331686537479272587427",
                "325938084959474812814722037016182574393",
                "55030333524285549612708431989715222969",
                "189692135388723762671179049222014938680",
                "268347765392776722820548116078944858468",
                "68860408180380056120812084260736257586",
                "101506122728373862828355737642028729389",
                "261104001740472006705787271478211920945",
                "102517267821207842162073957347805317418",
                "277520334333955264787363960026410344983",
                "131722666974530336955358580486147791888",
                "154045439088021880170804602014951719044",
                "183394433316313172637662585870132332815"
            ]
        },
        "id": "CVE-2021-3622-5c7db85f"
    },
    {
        "signature_type": "Function",
        "deprecated": false,
        "source": "https://github.com/libguestfs/hivex/commit/771728218dac2fbf6997a7e53225e75a4c6b7255",
        "signature_version": "v1",
        "target": {
            "function": "_hivex_get_children",
            "file": "lib/node.c"
        },
        "digest": {
            "function_hash": "171072671982664405333538485700709584878",
            "length": 1790.0
        },
        "id": "CVE-2021-3622-c3d94877"
    }
]