CVE-2023-24903
09.05.2023, 18:15
Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability
Vendor | Product | Version |
---|---|---|
microsoft | windows_10_1507 | 𝑥 < 10.0.10240.19926 |
microsoft | windows_10_1607 | 𝑥 < 10.0.14393.5921 |
microsoft | windows_10_1809 | 𝑥 < 10.0.17763.4377 |
microsoft | windows_10_20h2 | 𝑥 < 10.0.19042.2965 |
microsoft | windows_10_21h2 | 𝑥 < 10.0.19044.2965 |
microsoft | windows_10_22h2 | 𝑥 < 10.0.19045.2965 |
microsoft | windows_11_22h2 | 𝑥 < 10.0.22000.1702 |
microsoft | windows_server_2008 | - |
microsoft | windows_server_2012 | - |
microsoft | windows_server_2016 | - |
microsoft | windows_server_2019 | - |
microsoft | windows_server_2022 | - |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-415 - Double FreeThe product calls free() twice on the same memory address, potentially leading to modification of unexpected memory locations.
- CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')The program contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.