CVE-2024-20697

Windows libarchive Remote Code Execution Vulnerability
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:-:*:*:*:*:*:*:*

History

21 Nov 2024, 08:52

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/06/04/2 -
  • () http://www.openwall.com/lists/oss-security/2024/06/05/1 -
  • () https://github.com/advisories/GHSA-w6xv-37jv-7cjr -
  • () https://www.zerodayinitiative.com/blog/2024/4/17/cve-2024-20697-windows-libarchive-remote-code-execution-vulnerability -
References () https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20697 - Patch, Vendor Advisory () https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20697 - Patch, Vendor Advisory
Summary (en) Windows Libarchive Remote Code Execution Vulnerability (en) Windows libarchive Remote Code Execution Vulnerability

08 Oct 2024, 16:15

Type Values Removed Values Added
References
  • {'url': 'http://www.openwall.com/lists/oss-security/2024/06/04/2', 'source': 'secure@microsoft.com'}
  • {'url': 'http://www.openwall.com/lists/oss-security/2024/06/05/1', 'source': 'secure@microsoft.com'}
  • {'url': 'https://github.com/advisories/GHSA-w6xv-37jv-7cjr', 'source': 'secure@microsoft.com'}
  • {'url': 'https://www.zerodayinitiative.com/blog/2024/4/17/cve-2024-20697-windows-libarchive-remote-code-execution-vulnerability', 'source': 'secure@microsoft.com'}

10 Jun 2024, 18:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/06/04/2 -

10 Jun 2024, 17:16

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/06/05/1 -

08 Jun 2024, 13:15

Type Values Removed Values Added
References
  • () https://github.com/advisories/GHSA-w6xv-37jv-7cjr -
  • () https://www.zerodayinitiative.com/blog/2024/4/17/cve-2024-20697-windows-libarchive-remote-code-execution-vulnerability -

29 May 2024, 00:15

Type Values Removed Values Added
CWE CWE-122

28 May 2024, 21:16

Type Values Removed Values Added
CWE CWE-122

14 Jan 2024, 21:56

Type Values Removed Values Added
CPE cpe:2.3:o:microsoft:windows_server_2022_23h2:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*
CWE NVD-CWE-noinfo
References () https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20697 - () https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20697 - Patch, Vendor Advisory
First Time Microsoft windows Server 2022 23h2
Microsoft
Microsoft windows 11 23h2
Microsoft windows 11 22h2

09 Jan 2024, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-09 18:15

Updated : 2024-11-21 08:52


NVD link : CVE-2024-20697

Mitre link : CVE-2024-20697

CVE.ORG link : CVE-2024-20697


JSON object : View

Products Affected

microsoft

  • windows_server_2022_23h2
  • windows_11_23h2
  • windows_11_22h2
CWE
CWE-122

Heap-based Buffer Overflow

NVD-CWE-noinfo