THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Fathom (Privacy friendly web analytics)
Zendesk (Helpdesk and Chat)

Ok

Home | EN
Support
CVE
PUBLISHED

CVE-2024-20696

Windows libarchive Remote Code Execution Vulnerability

Assignermicrosoft
Reserved2023-11-28
Published2024-01-09
Updated2024-07-19

Description

Windows libarchive Remote Code Execution Vulnerability



HIGH: 7.3CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Problem types

CWE-122: Heap-based Buffer Overflow

Product status

10.0.0 before 10.0.17763.5329
affected

10.0.0 before 10.0.17763.5329
affected

10.0.0 before 10.0.17763.5329
affected

10.0.0 before 10.0.20348.2227
affected

10.0.0 before 10.0.22000.2713
affected

10.0.0 before 10.0.19044.3930
affected

10.0.0 before 10.0.22621.3007
affected

10.0.0 before 10.0.19045.3930
affected

10.0.0 before 10.0.22631.3007
affected

10.0.0 before 10.0.22631.3007
affected

10.0.0 before 10.0.25398.643
affected

References

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20696 (Windows Libarchive Remote Code Execution Vulnerability) vendor-advisory

https://clearbluejar.github.io/posts/patch-tuesday-diffing-cve-2024-20696-windows-libarchive-rce/

https://github.com/clearbluejar/CVE-2024-20696

cve.org CVE-2024-20696

nvd.nist.gov CVE-2024-20696

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-20696
© Copyright 2024 THREATINT. Made in Cyprus with +