This script is Copyright (C) 2015 Tenable Network Security, Inc.
The remote Scientific Linux host is missing one or more security
It was found that hivex attempted to read beyond its allocated buffer
when reading a hive file with a very small size or with a truncated or
improperly formatted content. An attacker able to supply a specially
crafted hive file to an application using the hivex library could
possibly use this flaw to execute arbitrary code with the privileges
of the user running that application. (CVE-2014-9273)
The hivex package has been upgraded to upstream version 1.3.10, which
provides a number of bug fixes and enhancements over the previous
This update also fixes the following bugs :
- Due to an error in the hivex_value_data_cell_offset()
function, the hivex utility could, in some cases, print
an 'Argument list is too long' message and terminate
unexpectedly when processing hive files from the Windows
Registry. This update fixes the underlying code and
hivex now processes hive files as expected.
- A typographical error in the Win::Hivex.3pm manual page
has been corrected.
See also :
Update the affected packages.
Risk factor :
Medium / CVSS Base Score : 4.6