First published: Tue Apr 09 2024(Updated: )
libarchive Remote Code Execution Vulnerability
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/libarchive | <3.6.0-1ubuntu1.1 | 3.6.0-1ubuntu1.1 |
ubuntu/libarchive | <3.6.2-1ubuntu1.1 | 3.6.2-1ubuntu1.1 |
ubuntu/libarchive | <3.7.2-2ubuntu0.1 | 3.7.2-2ubuntu0.1 |
debian/libarchive | 3.4.3-2+deb11u1 3.6.2-1+deb12u1 3.7.4-1 | |
Microsoft Windows Server 2022 23H2 | ||
Oracle Libarchive | <3.7.4 | |
Fedora | =39 | |
Fedora | =40 | |
Windows 11 | <10.0.22621.3447 | |
Windows 11 | <10.0.22631.3447 | |
Microsoft Windows Server 2022 | <10.0.25398.830 | |
Windows 11 | =23H2 | |
Windows 11 | =23H2 | |
Windows 11 | =22H2 | |
Windows 11 | =22H2 |
https://github.com/libarchive/libarchive/commit/eb7939b24a681a04648a59cdebd386b1e9dc9237.patch
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-26256 is classified as a Remote Code Execution vulnerability, which is considered critical in nature.
To mitigate CVE-2024-26256, apply the latest patches provided by Microsoft and Ubuntu based on your system version.
CVE-2024-26256 affects multiple versions of Microsoft Windows 11, Windows Server 2022, and specific versions of the libarchive package.
Currently, no specific workarounds have been published for CVE-2024-26256, and it is recommended to apply patches as soon as they are available.
CVE-2024-26256 can lead to unauthorized remote code execution, potentially allowing attackers to take control of the affected system.