Описание
Windows libarchive Remote Code Execution Vulnerability
A flaw was found in the libarchive library. A heap-based buffer overflow in the execute_filter_e8 function in the libarchive/archive_read_support_format_rar.c file can be triggered when a specially crafted RAR archive is processed, causing a crash to the application linked to the library and resulting in a denial of service.
Отчет
The CVE-2024-20697 was assigned to track this issue in Windows systems and the CVE-2024-26256 was assigned to track the issue in libarchive upstream. See the CVE-2024-26256 page for more information about this issue at https://access.redhat.com/security/cve/CVE-2024-26256.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 10 | libarchive | Not affected | ||
| Red Hat Enterprise Linux 6 | libarchive | Not affected | ||
| Red Hat Enterprise Linux 7 | libarchive | Not affected | ||
| Red Hat Enterprise Linux 8 | libarchive | Not affected | ||
| Red Hat Enterprise Linux 9 | libarchive | Not affected |
Показывать по
Ссылки на источники
Дополнительная информация
Статус:
7.5 High
CVSS3
Связанные уязвимости
Windows libarchive Remote Code Execution Vulnerability
Windows Libarchive Remote Code Execution Vulnerability
Уязвимость библиотеки Libarchive операционной системы Windows, позволяющая нарушителю выполнить произвольный код
7.5 High
CVSS3