Home

Description

Windows libarchive Remote Code Execution Vulnerability

PUBLISHED Reserved 2023-11-28 | Published 2024-01-09 | Updated 2025-11-03 | Assigner microsoft




HIGH: 7.3CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Problem types

CWE-122: Heap-based Buffer Overflow

Product status

10.0.17763.0 (custom) before 10.0.17763.5329
affected

10.0.0 (custom) before 10.0.17763.5329
affected

10.0.17763.0 (custom) before 10.0.17763.5329
affected

10.0.17763.0 (custom) before 10.0.17763.5329
affected

10.0.20348.0 (custom) before 10.0.20348.2227
affected

10.0.0 (custom) before 10.0.22000.2713
affected

10.0.19043.0 (custom) before 10.0.19044.3930
affected

10.0.22621.0 (custom) before 10.0.22621.3007
affected

10.0.19045.0 (custom) before 10.0.19045.3930
affected

10.0.22631.0 (custom) before 10.0.22631.3007
affected

10.0.22631.0 (custom) before 10.0.22631.3007
affected

10.0.25398.0 (custom) before 10.0.25398.643
affected

References

msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20696 (Windows Libarchive Remote Code Execution Vulnerability) vendor-advisory

clearbluejar.github.io/...2024-20696-windows-libarchive-rce/

github.com/clearbluejar/CVE-2024-20696

lists.debian.org/debian-lts-announce/2024/11/msg00007.html

msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20696 (Windows libarchive Remote Code Execution Vulnerability) vendor-advisory

cve.org (CVE-2024-20696)

nvd.nist.gov (CVE-2024-20696)

Download JSON