CVE-2024-20655Use After Free in Microsoft Windows Server 2008 R2 Service Pack 1

CWE-416Use After Free8 documents5 sources
Severity
6.6MEDIUMNVD
EPSS
0.4%
top 38.27%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 9

Description

Microsoft Online Certificate Status Protocol (OCSP) Remote Code Execution Vulnerability

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:HExploitability: 0.7 | Impact: 5.9

Affected Packages17 packages

CVEListV5microsoft/windows_server_20126.2.9200.06.2.9200.24664
CVEListV5microsoft/windows_server_201610.0.14393.010.0.14393.6614
CVEListV5microsoft/windows_server_201910.0.17763.010.0.17763.5329
CVEListV5microsoft/windows_server_202210.0.20348.010.0.20348.2227
CVEListV5microsoft/windows_server_2012_r26.3.9600.06.3.9600.21765

Patches

🔴Vulnerability Details

1
GHSA
GHSA-c2cf-p6qq-wxrr: Microsoft Online Certificate Status Protocol (OCSP) Remote Code Execution Vulnerability2024-01-09

📋Vendor Advisories

1
Microsoft
Microsoft Online Certificate Status Protocol (OCSP) Remote Code Execution Vulnerability2024-01-09

🕵️Threat Intelligence

5
Trendmicro
The January 2024 Security Update Review2024-01-09
Trendmicro
The January 2024 Security Update Review2024-01-09
Trendmicro
The January 2024 Security Update Review2024-01-09
Bleepingcomputer
Microsoft January 2024 Patch Tuesday fixes 49 flaws, 12 RCE bugs2024-01-09
Trendmicro
The January 2024 Security Update Review2024-01-09
CVE-2024-20655 — Use After Free in Microsoft | cvebase