Описание
Windows libarchive Remote Code Execution Vulnerability
A flaw was found in the libarchive library. A heap-based buffer overflow in the execute_filter_e8 function in the libarchive/archive_read_support_format_rar.c file can be triggered when a specially crafted RAR archive is processed, causing a crash to the application linked to the library and resulting in a denial of service.
Отчет
The CVE-2024-20697 was assigned to track this issue in Windows systems and the CVE-2024-26256 was assigned to track the issue in libarchive upstream. See the CVE-2024-26256 page for more information about this issue at https://access.redhat.com/security/cve/CVE-2024-26256.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 6 | libarchive | Not affected | ||
Red Hat Enterprise Linux 7 | libarchive | Not affected | ||
Red Hat Enterprise Linux 8 | libarchive | Not affected | ||
Red Hat Enterprise Linux 9 | libarchive | Not affected |
Показывать по
Ссылки на источники
Дополнительная информация
Статус:
7.5 High
CVSS3
Связанные уязвимости
Windows libarchive Remote Code Execution Vulnerability
Windows libarchive Remote Code Execution Vulnerability
Windows Libarchive Remote Code Execution Vulnerability
Уязвимость библиотеки Libarchive операционной системы Windows, позволяющая нарушителю выполнить произвольный код
7.5 High
CVSS3