First published: Tue Apr 12 2022(Updated: )
GitHub: Git for Windows' uninstaller vulnerable to DLL hijacking when run under the SYSTEM user account.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Visual Studio 2017 | >=15.0<15.9.46 | |
Microsoft Visual Studio 2019 | >=16.0<16.7.27 | |
Microsoft Visual Studio 2019 | >=16.8<16.9.19 | |
Microsoft Visual Studio 2019 | >=16.10<16.11.12 | |
Microsoft Visual Studio 2022 | >=17.0.0<17.0.8 | |
Microsoft Visual Studio 2022 | >=17.1.0<17.1.4 | |
Git For Windows Project Git For Windows | <2.35.2 | |
Microsoft Visual Studio 2022 | >=17.0<17.0.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-24767 is a vulnerability in GitHub: Git for Windows' uninstaller that is susceptible to DLL hijacking when run under the SYSTEM user account.
CVE-2022-24767 has a severity rating of 7.8, which is considered high.
Microsoft Visual Studio 2017, Microsoft Visual Studio 2019, and Git for Windows (up to version 2.35.2) are affected by CVE-2022-24767.
CVE-2022-24767 affects Microsoft Visual Studio 2017 versions between 15.0 and 15.9.46.
To fix CVE-2022-24767, it is recommended to update to a secure version of the affected software or apply the necessary patches provided by the vendor.