Vulnerabilites related to rarlab - winrar
Vulnerability from fkie_nvd
Published
2005-10-20 10:02
Modified
2025-04-03 01:03
Severity ?
Summary
Stack-based buffer overflow in UNACEV2.DLL for RARLAB WinRAR 2.90 through 3.50 allows remote attackers to execute arbitrary code via an ACE archive containing a file with a long name.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rarlab:winrar:2.90:*:*:*:*:*:*:*", "matchCriteriaId": "0FFE81D1-EE81-415D-ACE0-F97AF38BE007", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "53BDA79B-B1CC-479C-A1DA-41DDDE098EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.10:*:*:*:*:*:*:*", "matchCriteriaId": "16A1E0B7-020F-4110-9603-58CA8CEB7581", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.10_beta3:*:*:*:*:*:*:*", "matchCriteriaId": "AE627C32-9F4B-4D36-AC4B-5D01A47BFD88", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.10_beta5:*:*:*:*:*:*:*", "matchCriteriaId": "3366C2D1-F30A-413B-94A2-7DBDACC083EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.11:*:*:*:*:*:*:*", "matchCriteriaId": "8585089C-A6B5-4BFE-BEA3-133B94F24F72", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.20:*:*:*:*:*:*:*", "matchCriteriaId": "C1011521-AEF2-40EB-B671-66B20FF01CC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.40:*:*:*:*:*:*:*", "matchCriteriaId": "9843D850-DC4C-49D5-AAEB-EF75FB54F08C", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.41:*:*:*:*:*:*:*", "matchCriteriaId": "2C9B3100-2223-4201-AE29-B4A4EAFF2595", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.42:*:*:*:*:*:*:*", "matchCriteriaId": "7F95B556-A1B4-4AEF-8223-5ED44819515D", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.50:*:*:*:*:*:*:*", "matchCriteriaId": "C89BC32A-6D3B-4B83-BD49-856233EEF51C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in UNACEV2.DLL for RARLAB WinRAR 2.90 through 3.50 allows remote attackers to execute arbitrary code via an ACE archive containing a file with a long name." } ], "id": "CVE-2005-3263", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-10-20T10:02:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0266.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/16973/" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2005-53/advisory/" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/19915" }, { "source": "cve@mitre.org", "url": "http://www.rarlabs.com/rarnew.htm" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/15062" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0266.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/16973/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2005-53/advisory/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/19915" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.rarlabs.com/rarnew.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/15062" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-12-22 01:03
Modified
2025-04-03 01:03
Severity ?
Summary
Buffer overflow in the "Add to archive" command in WinRAR 3.51 allows user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code by tricking the user into adding a file whose filename contains a non-default code page and non-ANSI characters, as demonstrated using a Chinese filename, possibly due to buffer expansion when using the WideCharToMultiByte API. NOTE: it is not clear whether this problem can be exploited for code execution. If not, then perhaps the user-assisted nature of the attack should exclude the issue from inclusion in CVE.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rarlab:winrar:3.51:*:*:*:*:*:*:*", "matchCriteriaId": "F5611BDE-8CB6-4FCE-BB12-D16BF60BCE64", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in the \"Add to archive\" command in WinRAR 3.51 allows user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code by tricking the user into adding a file whose filename contains a non-default code page and non-ANSI characters, as demonstrated using a Chinese filename, possibly due to buffer expansion when using the WideCharToMultiByte API. NOTE: it is not clear whether this problem can be exploited for code execution. If not, then perhaps the user-assisted nature of the attack should exclude the issue from inclusion in CVE." } ], "id": "CVE-2005-4474", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2005-12-22T01:03:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/290" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/420006/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/15999" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/290" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/420006/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/15999" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-02-05 20:29
Modified
2025-03-13 17:07
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Summary
In WinRAR versions prior to and including 5.61, There is path traversal vulnerability when crafting the filename field of the ACE format (in UNACEV2.dll). When the filename field is manipulated with specific patterns, the destination (extraction) folder is ignored, thus treating the filename as an absolute path.
References
{ "cisaActionDue": "2022-08-15", "cisaExploitAdd": "2022-02-15", "cisaRequiredAction": "Apply updates per vendor instructions.", "cisaVulnerabilityName": "WinRAR Absolute Path Traversal Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rarlab:winrar:*:*:*:*:*:*:*:*", "matchCriteriaId": "7EA0C7CE-99E6-4C92-AE89-6C6A8DF92126", "versionEndIncluding": "5.61", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In WinRAR versions prior to and including 5.61, There is path traversal vulnerability when crafting the filename field of the ACE format (in UNACEV2.dll). When the filename field is manipulated with specific patterns, the destination (extraction) folder is ignored, thus treating the filename as an absolute path." }, { "lang": "es", "value": "En WinRAR, en versiones anteriores a la 5.61, hay una vulnerabilidad de salto de directorio al manipular el campo \"filename\" del formato ACE (en UNACEV2.dll). Cuando este campo se manipula con patrones espec\u00edficos, la carpeta de destino (extracci\u00f3n) se ignora, tratando el nombre de archivo como ruta absoluta." } ], "id": "CVE-2018-20250", "lastModified": "2025-03-13T17:07:28.570", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2019-02-05T20:29:00.243", "references": [ { "source": "cve@checkpoint.com", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/152618/RARLAB-WinRAR-ACE-Format-Input-Validation-Remote-Code-Execution.html" }, { "source": "cve@checkpoint.com", "tags": [ "Third Party Advisory" ], "url": "http://www.rapid7.com/db/modules/exploit/windows/fileformat/winrar_ace" }, { "source": "cve@checkpoint.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106948" }, { "source": "cve@checkpoint.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/blau72/CVE-2018-20250-WinRAR-ACE" }, { "source": "cve@checkpoint.com", "tags": [ "Exploit", "Press/Media Coverage", "Third Party Advisory" ], "url": "https://research.checkpoint.com/extracting-code-execution-from-winrar/" }, { "source": "cve@checkpoint.com", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/46552/" }, { "source": "cve@checkpoint.com", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/46756/" }, { "source": "cve@checkpoint.com", "tags": [ "Release Notes" ], "url": "https://www.win-rar.com/whatsnew.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/152618/RARLAB-WinRAR-ACE-Format-Input-Validation-Remote-Code-Execution.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.rapid7.com/db/modules/exploit/windows/fileformat/winrar_ace" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106948" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/blau72/CVE-2018-20250-WinRAR-ACE" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Press/Media Coverage", "Third Party Advisory" ], "url": "https://research.checkpoint.com/extracting-code-execution-from-winrar/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/46552/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/46756/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://www.win-rar.com/whatsnew.html" } ], "sourceIdentifier": "cve@checkpoint.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-36" } ], "source": "cve@checkpoint.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-08-23 17:15
Modified
2024-12-20 17:50
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Summary
RARLAB WinRAR before 6.23 allows attackers to execute arbitrary code when a user attempts to view a benign file within a ZIP archive. The issue occurs because a ZIP archive may include a benign file (such as an ordinary .JPG file) and also a folder that has the same name as the benign file, and the contents of the folder (which may include executable content) are processed during an attempt to access only the benign file. This was exploited in the wild in April through October 2023.
References
{ "cisaActionDue": "2023-09-14", "cisaExploitAdd": "2023-08-24", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", "cisaVulnerabilityName": "RARLAB WinRAR Code Execution Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rarlab:winrar:*:*:*:*:*:*:*:*", "matchCriteriaId": "A586AE4C-6F08-4E96-B74C-AA0A7BF4F2DD", "versionEndExcluding": "6.23", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "RARLAB WinRAR before 6.23 allows attackers to execute arbitrary code when a user attempts to view a benign file within a ZIP archive. The issue occurs because a ZIP archive may include a benign file (such as an ordinary .JPG file) and also a folder that has the same name as the benign file, and the contents of the folder (which may include executable content) are processed during an attempt to access only the benign file. This was exploited in the wild in April through October 2023." }, { "lang": "es", "value": "RARLAB WinRAR anterior a la versi\u00f3n 6.23 permite a los atacantes ejecutar c\u00f3digo arbitrario cuando un usuario intenta ver un archivo benigno dentro de un archivo ZIP. El problema se produce porque un archivo ZIP puede incluir un archivo benigno (como un archivo .JPG normal) y tambi\u00e9n una carpeta que tiene el mismo nombre que el archivo benigno, y el contenido de la carpeta (que puede incluir contenido ejecutable) se procesa durante un intento de acceder \u00fanicamente al archivo benigno. Esto se explot\u00f3 de forma activa entre abril y octubre de 2023." } ], "id": "CVE-2023-38831", "lastModified": "2024-12-20T17:50:59.707", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2023-08-23T17:15:43.863", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/174573/WinRAR-Remote-Code-Execution.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://blog.google/threat-analysis-group/government-backed-actors-exploiting-winrar-vulnerability/" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://news.ycombinator.com/item?id=37236100" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Press/Media Coverage", "Third Party Advisory" ], "url": "https://www.bleepingcomputer.com/news/security/winrar-zero-day-exploited-since-april-to-hack-trading-accounts/" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Press/Media Coverage", "Third Party Advisory" ], "url": "https://www.group-ib.com/blog/cve-2023-38831-winrar-zero-day/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/174573/WinRAR-Remote-Code-Execution.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://blog.google/threat-analysis-group/government-backed-actors-exploiting-winrar-vulnerability/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://news.ycombinator.com/item?id=37236100" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Press/Media Coverage", "Third Party Advisory" ], "url": "https://www.bleepingcomputer.com/news/security/winrar-zero-day-exploited-since-april-to-hack-trading-accounts/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Press/Media Coverage", "Third Party Advisory" ], "url": "https://www.group-ib.com/blog/cve-2023-38831-winrar-zero-day/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-345" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-351" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2024-04-29 00:15
Modified
2025-06-20 17:38
Severity ?
Summary
RARLAB WinRAR before 7.00, on Linux and UNIX platforms, allows attackers to spoof the screen output, or cause a denial of service, via ANSI escape sequences.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://sdushantha.medium.com/ansi-escape-injection-vulnerability-in-winrar-a2cbfac4b983 | Exploit, Third Party Advisory | |
cve@mitre.org | https://www.rarlab.com/rarnew.htm | Release Notes | |
af854a3a-2127-422b-91ae-364da2661108 | https://sdushantha.medium.com/ansi-escape-injection-vulnerability-in-winrar-a2cbfac4b983 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.rarlab.com/rarnew.htm | Release Notes |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rarlab:winrar:*:*:*:*:*:*:*:*", "matchCriteriaId": "5ED6BD9E-C2E3-4777-9757-3B24FFAFC327", "versionEndExcluding": "7.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false }, { "criteria": "cpe:2.3:o:opengroup:unix:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A90CB3A-9BE7-475C-9E75-6ECAD2106302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "RARLAB WinRAR before 7.00, on Linux and UNIX platforms, allows attackers to spoof the screen output, or cause a denial of service, via ANSI escape sequences." }, { "lang": "es", "value": "RARLAB WinRAR anterior a 7.00, en plataformas Linux y UNIX, permite a los atacantes falsificar la salida de la pantalla o provocar una denegaci\u00f3n de servicio mediante secuencias de escape ANSI." } ], "id": "CVE-2024-33899", "lastModified": "2025-06-20T17:38:35.383", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-04-29T00:15:07.773", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://sdushantha.medium.com/ansi-escape-injection-vulnerability-in-winrar-a2cbfac4b983" }, { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://www.rarlab.com/rarnew.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://sdushantha.medium.com/ansi-escape-injection-vulnerability-in-winrar-a2cbfac4b983" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://www.rarlab.com/rarnew.htm" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-150" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2025-08-08 12:15
Modified
2025-08-15 16:15
Severity ?
Summary
A path traversal vulnerability affecting the Windows version of WinRAR allows the attackers to execute arbitrary code by crafting malicious archive files. This vulnerability was exploited in the wild and was discovered by Anton Cherepanov, Peter Košinár, and Peter Strýček
from ESET.
References
{ "cisaActionDue": "2025-09-02", "cisaExploitAdd": "2025-08-12", "cisaRequiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", "cisaVulnerabilityName": "RARLAB WinRAR Path Traversal Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rarlab:winrar:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8DD81E1-8FF3-4597-A2EA-C71D3856103E", "versionEndExcluding": "7.13", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A path traversal vulnerability affecting the Windows version of WinRAR allows the attackers to execute arbitrary code by crafting malicious archive files. This vulnerability was exploited in the wild and was discovered by\u00a0Anton Cherepanov, Peter Ko\u0161in\u00e1r, and Peter Str\u00fd\u010dek\n from ESET." }, { "lang": "es", "value": "Una vulnerabilidad de path traversal que afecta a la versi\u00f3n de WinRAR para Windows permite a los atacantes ejecutar c\u00f3digo arbitrario mediante la manipulaci\u00f3n de archivos maliciosos. Esta vulnerabilidad fue explotada indiscriminadamente y descubierta por Anton Cherepanov, Peter Ko\u0161in\u00e1r y Peter Str\u00fd?ek de ESET." } ], "id": "CVE-2025-8088", "lastModified": "2025-08-15T16:15:30.737", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "LOCAL", "availabilityRequirement": "NOT_DEFINED", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "ACTIVE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "security@eset.com", "type": "Secondary" } ] }, "published": "2025-08-08T12:15:29.343", "references": [ { "source": "security@eset.com", "tags": [ "Release Notes" ], "url": "https://www.win-rar.com/singlenewsview.html?\u0026L=0\u0026tx_ttnews%5Btt_news%5D=283\u0026cHash=a64b4a8f662d3639dec8d65f47bc93c5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.vicarius.io/vsociety/posts/cve-2025-8088-detect-winrar-zero-day" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.vicarius.io/vsociety/posts/cve-2025-8088-mitigate-winrar-zero-day-using-srp-and-ifeo" }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "tags": [ "Press/Media Coverage" ], "url": "https://www.welivesecurity.com/en/eset-research/update-winrar-tools-now-romcom-and-others-exploiting-zero-day-vulnerability/#the-discovery-of-cve-2025-8088" } ], "sourceIdentifier": "security@eset.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-35" } ], "source": "security@eset.com", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2024-04-02 21:15
Modified
2025-06-20 18:15
Severity ?
Summary
RARLAB WinRAR Mark-Of-The-Web Bypass Vulnerability. This vulnerability allows remote attackers to bypass the Mark-Of-The-Web protection mechanism on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must perform a specific action on a malicious page.
The specific flaw exists within the archive extraction functionality. A crafted archive entry can cause the creation of an arbitrary file without the Mark-Of-The-Web. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current user. Was ZDI-CAN-23156.
References
▶ | URL | Tags | |
---|---|---|---|
zdi-disclosures@trendmicro.com | https://www.rarlab.com/rarnew.htm#27.%20Busgs%20fixed | Release Notes | |
zdi-disclosures@trendmicro.com | https://www.zerodayinitiative.com/advisories/ZDI-24-357/ | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.rarlab.com/rarnew.htm#27.%20Busgs%20fixed | Release Notes | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-24-357/ | Third Party Advisory, VDB Entry |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rarlab:winrar:7.00:beta4:*:*:*:*:*:*", "matchCriteriaId": "3916EB0B-BCF0-4B6A-A0C5-FE9C2E1967AB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "RARLAB WinRAR Mark-Of-The-Web Bypass Vulnerability. This vulnerability allows remote attackers to bypass the Mark-Of-The-Web protection mechanism on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must perform a specific action on a malicious page.\n\nThe specific flaw exists within the archive extraction functionality. A crafted archive entry can cause the creation of an arbitrary file without the Mark-Of-The-Web. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current user. Was ZDI-CAN-23156." }, { "lang": "es", "value": "Vulnerabilidad de omisi\u00f3n de marca de la web en RARLAB WinRAR. Esta vulnerabilidad permite a atacantes remotos eludir el mecanismo de protecci\u00f3n Mark-Of-The-Web en las instalaciones afectadas de RARLAB WinRAR. Se requiere la interacci\u00f3n del usuario para aprovechar esta vulnerabilidad, ya que el objetivo debe realizar una acci\u00f3n espec\u00edfica en una p\u00e1gina maliciosa. La falla espec\u00edfica existe dentro de la funcionalidad de extracci\u00f3n de archivos. Una entrada de archivo manipulada puede provocar la creaci\u00f3n de un archivo arbitrario sin la marca de la web. Un atacante puede aprovechar esto junto con otras vulnerabilidades para ejecutar c\u00f3digo arbitrario en el contexto del usuario actual. Era ZDI-CAN-23156." } ], "id": "CVE-2024-30370", "lastModified": "2025-06-20T18:15:03.657", "metrics": { "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "zdi-disclosures@trendmicro.com", "type": "Secondary" } ] }, "published": "2024-04-02T21:15:50.403", "references": [ { "source": "zdi-disclosures@trendmicro.com", "tags": [ "Release Notes" ], "url": "https://www.rarlab.com/rarnew.htm#27.%20Busgs%20fixed" }, { "source": "zdi-disclosures@trendmicro.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-357/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://www.rarlab.com/rarnew.htm#27.%20Busgs%20fixed" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-357/" } ], "sourceIdentifier": "zdi-disclosures@trendmicro.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-693" } ], "source": "zdi-disclosures@trendmicro.com", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2006-07-28 00:04
Modified
2025-04-03 01:03
Severity ?
Summary
Stack-based buffer overflow in the SFX module in WinRAR before 3.60 beta 8 has unspecified vectors and impact.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rarlab:winrar:3.60_beta8:*:*:*:*:*:*:*", "matchCriteriaId": "8C71933B-40E9-459C-84D4-B6E90DD7C2C4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the SFX module in WinRAR before 3.60 beta 8 has unspecified vectors and impact." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en pila en el m\u00f3dulo SFX en WinRAR anterior a 3.60 beta 8 tiene vectores no especificados e impacto." } ], "id": "CVE-2006-3912", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-07-28T00:04:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://www.osvdb.org/27031" }, { "source": "cve@mitre.org", "url": "http://www.rarlabs.com/rarnew.htm" }, { "source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/1984" }, { "source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/1985" }, { "source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/1992" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/27031" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.rarlabs.com/rarnew.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/1984" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/1985" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/1992" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-10-20 10:02
Modified
2025-04-03 01:03
Severity ?
Summary
Format string vulnerability in RARLAB WinRAR 2.90 through 3.50 allows remote attackers to execute arbitrary code via format string specifiers in a UUE/XXE file, which are not properly handled when WinRAR displays diagnostic errors related to an invalid filename.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rarlab:winrar:2.90:*:*:*:*:*:*:*", "matchCriteriaId": "0FFE81D1-EE81-415D-ACE0-F97AF38BE007", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "53BDA79B-B1CC-479C-A1DA-41DDDE098EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.10:*:*:*:*:*:*:*", "matchCriteriaId": "16A1E0B7-020F-4110-9603-58CA8CEB7581", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.10_beta3:*:*:*:*:*:*:*", "matchCriteriaId": "AE627C32-9F4B-4D36-AC4B-5D01A47BFD88", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.10_beta5:*:*:*:*:*:*:*", "matchCriteriaId": "3366C2D1-F30A-413B-94A2-7DBDACC083EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.11:*:*:*:*:*:*:*", "matchCriteriaId": "8585089C-A6B5-4BFE-BEA3-133B94F24F72", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.20:*:*:*:*:*:*:*", "matchCriteriaId": "C1011521-AEF2-40EB-B671-66B20FF01CC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.40:*:*:*:*:*:*:*", "matchCriteriaId": "9843D850-DC4C-49D5-AAEB-EF75FB54F08C", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.41:*:*:*:*:*:*:*", "matchCriteriaId": "2C9B3100-2223-4201-AE29-B4A4EAFF2595", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.42:*:*:*:*:*:*:*", "matchCriteriaId": "7F95B556-A1B4-4AEF-8223-5ED44819515D", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.50:*:*:*:*:*:*:*", "matchCriteriaId": "C89BC32A-6D3B-4B83-BD49-856233EEF51C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Format string vulnerability in RARLAB WinRAR 2.90 through 3.50 allows remote attackers to execute arbitrary code via format string specifiers in a UUE/XXE file, which are not properly handled when WinRAR displays diagnostic errors related to an invalid filename." } ], "id": "CVE-2005-3262", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-10-20T10:02:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/16973/" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2005-53/advisory/" }, { "source": "cve@mitre.org", "url": "http://www.rarlabs.com/rarnew.htm" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/15062" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/16973/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2005-53/advisory/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.rarlabs.com/rarnew.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/15062" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-04-03 06:15
Modified
2025-07-01 15:10
Severity ?
Summary
Issue that bypasses the "Mark of the Web" security warning function for files when opening a symbolic link that points to an executable file exists in WinRAR versions prior to 7.11. If a symbolic link specially crafted by an attacker is opened on the affected product, arbitrary code may be executed.
References
▶ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | https://jvn.jp/en/jp/JVN59547048/ | Third Party Advisory | |
vultures@jpcert.or.jp | https://www.win-rar.com/start.html?&L=0 | Release Notes |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rarlab:winrar:*:*:*:*:*:*:*:*", "matchCriteriaId": "BE115B9C-816C-4D0F-979E-E46F02B34136", "versionEndExcluding": "7.11", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Issue that bypasses the \"Mark of the Web\" security warning function for files when opening a symbolic link that points to an executable file exists in WinRAR versions prior to 7.11. If a symbolic link specially crafted by an attacker is opened on the affected product, arbitrary code may be executed." }, { "lang": "es", "value": "En versiones de WinRAR anteriores a la 7.11, existe un problema que omite la funci\u00f3n de advertencia de seguridad \"Mark of the Web\" al abrir un enlace simb\u00f3lico que apunta a un archivo ejecutable. Si se abre un enlace simb\u00f3lico manipulado espec\u00edficamente por un atacante en el producto afectado, se podr\u00eda ejecutar c\u00f3digo arbitrario." } ], "id": "CVE-2025-31334", "lastModified": "2025-07-01T15:10:55.773", "metrics": { "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 0.9, "impactScore": 5.9, "source": "vultures@jpcert.or.jp", "type": "Secondary" } ] }, "published": "2025-04-03T06:15:42.903", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ], "url": "https://jvn.jp/en/jp/JVN59547048/" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Release Notes" ], "url": "https://www.win-rar.com/start.html?\u0026L=0" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-356" } ], "source": "vultures@jpcert.or.jp", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Buffer overflow in WinRAR 3.50 and earlier allows local users to execute arbitrary code via a long command-line argument. NOTE: because this program executes with the privileges of the invoking user, and because remote programs do not normally have the ability to specify a command-line argument for this program, there may not be a typical attack vector for the issue that crosses privilege boundaries. Therefore this may not be a vulnerability.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rarlab:winrar:2.90:*:*:*:*:*:*:*", "matchCriteriaId": "0FFE81D1-EE81-415D-ACE0-F97AF38BE007", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "53BDA79B-B1CC-479C-A1DA-41DDDE098EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.10:*:*:*:*:*:*:*", "matchCriteriaId": "16A1E0B7-020F-4110-9603-58CA8CEB7581", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.10_beta3:*:*:*:*:*:*:*", "matchCriteriaId": "AE627C32-9F4B-4D36-AC4B-5D01A47BFD88", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.10_beta5:*:*:*:*:*:*:*", "matchCriteriaId": "3366C2D1-F30A-413B-94A2-7DBDACC083EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.11:*:*:*:*:*:*:*", "matchCriteriaId": "8585089C-A6B5-4BFE-BEA3-133B94F24F72", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.20:*:*:*:*:*:*:*", "matchCriteriaId": "C1011521-AEF2-40EB-B671-66B20FF01CC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.30:*:*:*:*:*:*:*", "matchCriteriaId": "B73F9019-EA47-4962-B080-C65ED42000F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.40:*:*:*:*:*:*:*", "matchCriteriaId": "9843D850-DC4C-49D5-AAEB-EF75FB54F08C", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.41:*:*:*:*:*:*:*", "matchCriteriaId": "2C9B3100-2223-4201-AE29-B4A4EAFF2595", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.42:*:*:*:*:*:*:*", "matchCriteriaId": "7F95B556-A1B4-4AEF-8223-5ED44819515D", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.50:*:*:*:*:*:*:*", "matchCriteriaId": "C89BC32A-6D3B-4B83-BD49-856233EEF51C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in WinRAR 3.50 and earlier allows local users to execute arbitrary code via a long command-line argument. NOTE: because this program executes with the privileges of the invoking user, and because remote programs do not normally have the ability to specify a command-line argument for this program, there may not be a typical attack vector for the issue that crosses privilege boundaries. Therefore this may not be a vulnerability." } ], "id": "CVE-2005-4620", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://www.rarlab.com/rarnew.htm" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/420679/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/15123" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/data/vulnerabilities/exploits/0xletzdance.c" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.rarlab.com/rarnew.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/420679/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/15123" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/data/vulnerabilities/exploits/0xletzdance.c" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-05-21 17:15
Modified
2025-06-20 17:38
Severity ?
Summary
RARLAB WinRAR before 7.00, on Windows, allows attackers to spoof the screen output via ANSI escape sequences, a different issue than CVE-2024-33899.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://sdushantha.medium.com/ansi-escape-injection-vulnerability-in-winrar-a2cbfac4b983 | Exploit, Third Party Advisory | |
cve@mitre.org | https://www.rarlab.com/rarnew.htm | Release Notes | |
af854a3a-2127-422b-91ae-364da2661108 | https://sdushantha.medium.com/ansi-escape-injection-vulnerability-in-winrar-a2cbfac4b983 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.rarlab.com/rarnew.htm | Release Notes |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rarlab:winrar:*:*:*:*:*:*:*:*", "matchCriteriaId": "5ED6BD9E-C2E3-4777-9757-3B24FFAFC327", "versionEndExcluding": "7.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "RARLAB WinRAR before 7.00, on Windows, allows attackers to spoof the screen output via ANSI escape sequences, a different issue than CVE-2024-33899." }, { "lang": "es", "value": " RARLAB WinRAR anterior a 7.00, en Windows, permite a los atacantes falsificar la salida de la pantalla mediante secuencias de escape ANSI, un problema diferente al CVE-2024-33899." } ], "id": "CVE-2024-36052", "lastModified": "2025-06-20T17:38:46.913", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-05-21T17:15:09.250", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://sdushantha.medium.com/ansi-escape-injection-vulnerability-in-winrar-a2cbfac4b983" }, { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://www.rarlab.com/rarnew.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://sdushantha.medium.com/ansi-escape-injection-vulnerability-in-winrar-a2cbfac4b983" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://www.rarlab.com/rarnew.htm" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-150" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2004-08-18 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple stack-based buffer overflows in the get_header function in header.c for LHA 1.14, as used in products such as Barracuda Spam Firewall, allow remote attackers or local users to execute arbitrary code via long directory or file names in an LHA archive, which triggers the overflow when testing or extracting the archive.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFE4FA19-F2EA-4292-A441-2E4A39366942", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "FA5D7FD1-D5AB-4987-801A-FA464C31298A", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "772710C7-41FE-47E2-B0D7-A3C8D36C8808", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3:*:*:*:*:*:*:*", "matchCriteriaId": "7358AD98-44C1-4CC4-BD50-CFF3822F3A96", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "AAA1C283-E518-4BC6-BBF0-FCE09F9E0F17", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "5B8A74FB-07B0-42D6-ABF3-D7A073A329E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "49668AFD-4821-4D5A-BEBD-DF55A8AB58C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "57E0BFFD-D777-43A5-AEE8-765F55C86E93", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.6_sp1:*:*:*:*:*:*:*", "matchCriteriaId": "DAF9A151-6EBF-4760-A154-A34FF7C9E632", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "CA12B965-672C-444D-9774-0F76FE47EA29", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "E6C9B32C-5EC9-46BD-AA77-F414A143576C", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "823C27EB-C00F-4A7E-B832-013A50A1EE2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "BD217379-28E7-465E-843D-E7204EE0E89F", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.13:*:*:*:*:*:*:*", "matchCriteriaId": "EB96CB8A-59F3-4624-B2BA-687ECF929B79", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.51:*:linux_gateways:*:*:*:*:*", "matchCriteriaId": "6CC9AA17-3EF4-4BC5-9E29-5A6525B9AC51", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.51:*:linux_servers:*:*:*:*:*", "matchCriteriaId": "A9C60C23-FC4D-4D14-B3E3-ECD797888AB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.51:*:linux_workstations:*:*:*:*:*", "matchCriteriaId": "D04E2381-68CB-455F-8878-17C8E4112C95", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.52:*:linux_gateways:*:*:*:*:*", "matchCriteriaId": "4AE00A20-8152-48D9-9AC4-EA359284E635", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.52:*:linux_servers:*:*:*:*:*", "matchCriteriaId": "6B334073-9FF3-4F75-8702-51DB6937B7F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.52:*:linux_workstations:*:*:*:*:*", "matchCriteriaId": "2D553EF0-6A08-4DD0-A301-99AADAFBFFBB", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.60:*:samba_servers:*:*:*:*:*", "matchCriteriaId": "C8C41338-0651-425E-A823-C8CBD91977D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.5:*:client_security:*:*:*:*:*", "matchCriteriaId": "46F72328-7B69-4A1B-A065-E65544F27A75", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.41:*:mimesweeper:*:*:*:*:*", "matchCriteriaId": "2BA28970-0DB9-433E-83A1-36BF05DB062A", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.41:*:windows_servers:*:*:*:*:*", "matchCriteriaId": "C0D25A1D-2B31-4B29-96FE-A793F8244F66", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.41:*:workstations:*:*:*:*:*", "matchCriteriaId": "AC90ADFD-32FE-4EA1-9583-5EFE585152CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.42:*:mimesweeper:*:*:*:*:*", "matchCriteriaId": "B490FC59-616A-4F90-95D8-50F9C0D6CB40", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.42:*:windows_servers:*:*:*:*:*", "matchCriteriaId": "858468E0-4208-4703-A3AA-4BF6CC254DDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.42:*:workstations:*:*:*:*:*", "matchCriteriaId": "4E26052D-35B8-44E7-8F66-442BA55F4483", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.52:*:client_security:*:*:*:*:*", "matchCriteriaId": "CBA4A9B7-626A-4539-852F-96C49D860E41", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.21:*:ms_exchange:*:*:*:*:*", "matchCriteriaId": "19828867-7079-4233-A3B8-BF7A3052FB8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:2003:*:*:*:*:*:*:*", "matchCriteriaId": "831F0C4D-C85F-46DA-BC9E-D3F56DE2B085", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:2004:*:*:*:*:*:*:*", "matchCriteriaId": "7F996B07-8B07-42A6-86FC-B5B55F708861", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_for_firewalls:6.20:*:*:*:*:*:*:*", "matchCriteriaId": "119D5A71-E7C2-4603-9D78-A161D82BC2D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_internet_security:2003:*:*:*:*:*:*:*", "matchCriteriaId": "6689D4E1-F8DC-46D9-BA35-4E4AE9C28456", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_internet_security:2004:*:*:*:*:*:*:*", "matchCriteriaId": "0429B86A-F228-44E8-ABBB-D57BEE3679F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_personal_express:4.5:*:*:*:*:*:*:*", "matchCriteriaId": "72DE7015-C1FF-4803-8B28-5AF5ECC3AAB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_personal_express:4.6:*:*:*:*:*:*:*", "matchCriteriaId": "D04F7296-3290-40D1-9CFB-E52FADAE5719", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_personal_express:4.7:*:*:*:*:*:*:*", "matchCriteriaId": "B9A0DDB6-4B86-430E-879A-C835DBB96C42", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.31:*:*:*:*:*:*:*", "matchCriteriaId": "AC782BFC-6BA0-4823-8A6D-F7D83F55393C", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.32:*:*:*:*:*:*:*", "matchCriteriaId": "E1B09025-47B9-4F77-9DA6-80885E9A4EC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.20:*:*:*:*:*:*:*", "matchCriteriaId": "C1011521-AEF2-40EB-B671-66B20FF01CC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:lha:1.14i-9:*:i386:*:*:*:*:*", "matchCriteriaId": "EB59539A-8973-45C8-A553-1B524DA43937", "vulnerable": true }, { "criteria": "cpe:2.3:a:sgi:propack:2.4:*:*:*:*:*:*:*", "matchCriteriaId": "0702A32E-E577-403C-B4D9-15037D7100A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "29DC217F-C257-4A3C-9CBD-08010C30BEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:stalker:cgpmcafee:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "FC4CB399-2E2F-4A73-BA41-3EFB0DBDC404", "vulnerable": true }, { "criteria": "cpe:2.3:a:tsugio_okamoto:lha:1.14:*:*:*:*:*:*:*", "matchCriteriaId": "081C75A4-FDB1-4941-8276-985570632A82", "vulnerable": true }, { "criteria": "cpe:2.3:a:tsugio_okamoto:lha:1.15:*:*:*:*:*:*:*", "matchCriteriaId": "A623BD1B-DB9A-4545-9970-E3492AA39A33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tsugio_okamoto:lha:1.17:*:*:*:*:*:*:*", "matchCriteriaId": "8984B914-9850-405C-AAE6-A7C266F13BA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:winzip:winzip:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "523ADB29-C3D5-4C06-89B6-22B5FC68C240", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*", "matchCriteriaId": "3C84296C-2C8A-4DCD-9751-52951F8BEA9F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple stack-based buffer overflows in the get_header function in header.c for LHA 1.14, as used in products such as Barracuda Spam Firewall, allow remote attackers or local users to execute arbitrary code via long directory or file names in an LHA archive, which triggers the overflow when testing or extracting the archive." }, { "lang": "es", "value": "M\u00faltiples desbordamientos de b\u00fafer basados en la pila en la funci\u00f3n get_header de header.c de LHA 1.14 utilizado en productos como Barracuda Spam Firewall, permite a atacantes remotos o a usuarios locales ejecutar c\u00f3digo arbitrario mediante nombres de fichero o de directorio largos en un archivo LHA, lo que dispara el desbordamiento cuando se prueba o se extrae un fichero." } ], "id": "CVE-2004-0234", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-08-18T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://archives.neohapsis.com/archives/bugtraq/2006-04/0059.html" }, { "source": "cve@mitre.org", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000840" }, { "source": "cve@mitre.org", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020776.html" }, { "source": "cve@mitre.org", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020778.html" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=108422737918885\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/19514" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200405-02.xml" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1015866" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2004/dsa-515" }, { "source": "cve@mitre.org", "url": "http://www.guay-leroux.com/projects/barracuda-advisory-LHA.txt" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/5753" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/5754" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/archives/fedora-announce-list/2004-May/msg00005.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2004-178.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2004-179.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/10243" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2006/1220" }, { "source": "cve@mitre.org", "url": "https://bugzilla.fedora.us/show_bug.cgi?id=1833" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16012" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A977" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9881" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/bugtraq/2006-04/0059.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000840" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020776.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020778.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=108422737918885\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/19514" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200405-02.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1015866" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2004/dsa-515" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.guay-leroux.com/projects/barracuda-advisory-LHA.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/5753" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/5754" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/archives/fedora-announce-list/2004-May/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2004-178.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2004-179.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/10243" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2006/1220" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.fedora.us/show_bug.cgi?id=1833" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16012" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A977" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9881" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-12-30 05:59
Modified
2025-04-12 10:46
Severity ?
Summary
The file-execution functionality in WinRAR before 5.30 beta 5 allows local users to gain privileges via a Trojan horse file with a name similar to an extensionless filename that was selected by the user.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rarlab:winrar:*:beta_4:*:*:*:*:x64:*", "matchCriteriaId": "24EB2B24-7A37-48EC-9C61-13143A47D578", "versionEndIncluding": "5.30", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:*:beta_4:*:*:*:*:x86:*", "matchCriteriaId": "63FDC416-F409-42F5-8240-E18173131694", "versionEndIncluding": "5.30", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The file-execution functionality in WinRAR before 5.30 beta 5 allows local users to gain privileges via a Trojan horse file with a name similar to an extensionless filename that was selected by the user." }, { "lang": "es", "value": "La funcionalidad de ejecuci\u00f3n de archivo en WinRAR en versiones anteriores a 5.30 beta 5 permite a usuarios locales obtener privilegios a trav\u00e9s de un archivo Troyano con un nombre similar a un nombre de archivo sin extensi\u00f3n que fue seleccionado por el usuario." } ], "id": "CVE-2015-5663", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.7, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 1.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.4, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2015-12-30T05:59:00.113", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Vendor Advisory" ], "url": "http://jvn.jp/en/jp/JVN64636058/index.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Vendor Advisory" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000199" }, { "source": "vultures@jpcert.or.jp", "url": "http://www.securityfocus.com/bid/79666" }, { "source": "vultures@jpcert.or.jp", "url": "http://www.securitytracker.com/id/1034881" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://jvn.jp/en/jp/JVN64636058/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000199" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/79666" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1034881" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-02-05 20:29
Modified
2024-11-21 04:01
Severity ?
Summary
In WinRAR versions prior to and including 5.60, there is an out-of-bounds write vulnerability during parsing of crafted ACE and RAR archive formats. Successful exploitation could lead to arbitrary code execution in the context of the current user.
References
▶ | URL | Tags | |
---|---|---|---|
cve@checkpoint.com | http://www.securityfocus.com/bid/106948 | Third Party Advisory, VDB Entry | |
cve@checkpoint.com | https://research.checkpoint.com/extracting-code-execution-from-winrar/ | Exploit, Third Party Advisory | |
cve@checkpoint.com | https://www.win-rar.com/whatsnew.html | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/106948 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://research.checkpoint.com/extracting-code-execution-from-winrar/ | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.win-rar.com/whatsnew.html | Release Notes, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rarlab:winrar:*:*:*:*:*:*:*:*", "matchCriteriaId": "1BE78CF2-EF53-4E6E-AA07-57438305ED20", "versionEndIncluding": "5.60", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In WinRAR versions prior to and including 5.60, there is an out-of-bounds write vulnerability during parsing of crafted ACE and RAR archive formats. Successful exploitation could lead to arbitrary code execution in the context of the current user." }, { "lang": "es", "value": "En WinRAR, en versiones anteriores la 5.60 (inclusive), hay una vulnerabilidad de escritura fuera de l\u00edmites durante el an\u00e1lisis de formatos de archivo ACE y RAR manipulados. Su explotaci\u00f3n con \u00e9xito podr\u00eda permitir la ejecuci\u00f3n arbitraria de c\u00f3digo en el contexto del usuario actual." } ], "id": "CVE-2018-20252", "lastModified": "2024-11-21T04:01:10.453", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-02-05T20:29:00.320", "references": [ { "source": "cve@checkpoint.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106948" }, { "source": "cve@checkpoint.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://research.checkpoint.com/extracting-code-execution-from-winrar/" }, { "source": "cve@checkpoint.com", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.win-rar.com/whatsnew.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106948" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://research.checkpoint.com/extracting-code-execution-from-winrar/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.win-rar.com/whatsnew.html" } ], "sourceIdentifier": "cve@checkpoint.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "cve@checkpoint.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-05-02 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Directory traversal vulnerability in WinRAR 3.42 and earlier, when the user clicks on the ZIP file to extract it, allows remote attackers to create arbitrary files via a ... (triple dot) in the filename of the ZIP file.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rarlab:winrar:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "53BDA79B-B1CC-479C-A1DA-41DDDE098EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.10:*:*:*:*:*:*:*", "matchCriteriaId": "16A1E0B7-020F-4110-9603-58CA8CEB7581", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.10_beta3:*:*:*:*:*:*:*", "matchCriteriaId": "AE627C32-9F4B-4D36-AC4B-5D01A47BFD88", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.10_beta5:*:*:*:*:*:*:*", "matchCriteriaId": "3366C2D1-F30A-413B-94A2-7DBDACC083EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.11:*:*:*:*:*:*:*", "matchCriteriaId": "8585089C-A6B5-4BFE-BEA3-133B94F24F72", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.20:*:*:*:*:*:*:*", "matchCriteriaId": "C1011521-AEF2-40EB-B671-66B20FF01CC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.40:*:*:*:*:*:*:*", "matchCriteriaId": "9843D850-DC4C-49D5-AAEB-EF75FB54F08C", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.41:*:*:*:*:*:*:*", "matchCriteriaId": "2C9B3100-2223-4201-AE29-B4A4EAFF2595", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.42:*:*:*:*:*:*:*", "matchCriteriaId": "7F95B556-A1B4-4AEF-8223-5ED44819515D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in WinRAR 3.42 and earlier, when the user clicks on the ZIP file to extract it, allows remote attackers to create arbitrary files via a ... (triple dot) in the filename of the ZIP file." } ], "id": "CVE-2005-0331", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2005-05-02T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=110737609604210\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/12422" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20585" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=110737609604210\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/12422" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20585" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-02-13 01:29
Modified
2024-11-21 04:01
Severity ?
Summary
In WinRAR versions prior to and including 5.60, There is an out-of-bounds write vulnerability during parsing of a crafted LHA / LZH archive formats. Successful exploitation could lead to arbitrary code execution in the context of the current user.
References
▶ | URL | Tags | |
---|---|---|---|
cve@checkpoint.com | https://research.checkpoint.com/extracting-code-execution-from-winrar/ | Exploit, Third Party Advisory | |
cve@checkpoint.com | https://www.win-rar.com/whatsnew.html | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://research.checkpoint.com/extracting-code-execution-from-winrar/ | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.win-rar.com/whatsnew.html | Release Notes, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rarlab:winrar:*:*:*:*:*:*:*:*", "matchCriteriaId": "1BE78CF2-EF53-4E6E-AA07-57438305ED20", "versionEndIncluding": "5.60", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In WinRAR versions prior to and including 5.60, There is an out-of-bounds write vulnerability during parsing of a crafted LHA / LZH archive formats. Successful exploitation could lead to arbitrary code execution in the context of the current user." }, { "lang": "es", "value": "En WinRAR, en versiones anteriores a la 5.60 (inclusive), hay una vulnerabilidad de escritura fuera de l\u00edmites durante el an\u00e1lisis de formatos de archivo LHA/LZH manipulados. Su explotaci\u00f3n con \u00e9xito podr\u00eda permitir la ejecuci\u00f3n arbitraria de c\u00f3digo en el contexto del usuario actual." } ], "id": "CVE-2018-20253", "lastModified": "2024-11-21T04:01:10.580", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-02-13T01:29:00.287", "references": [ { "source": "cve@checkpoint.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://research.checkpoint.com/extracting-code-execution-from-winrar/" }, { "source": "cve@checkpoint.com", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.win-rar.com/whatsnew.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://research.checkpoint.com/extracting-code-execution-from-winrar/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.win-rar.com/whatsnew.html" } ], "sourceIdentifier": "cve@checkpoint.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "cve@checkpoint.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-03-29 19:15
Modified
2024-11-21 07:26
Severity ?
Summary
This vulnerability allows remote attackers to disclose sensitive information on affected installations of RARLAB WinRAR 6.11.0.0. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of ZIP files. Crafted data in a ZIP file can trigger a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-19232.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rarlab:winrar:6.11:*:*:*:*:*:*:*", "matchCriteriaId": "D8D204C8-5773-49AD-B236-5E8F0DBFB0E1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "This vulnerability allows remote attackers to disclose sensitive information on affected installations of RARLAB WinRAR 6.11.0.0. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of ZIP files. Crafted data in a ZIP file can trigger a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-19232." } ], "id": "CVE-2022-43650", "lastModified": "2024-11-21T07:26:58.553", "metrics": { "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.0, "impactScore": 1.4, "source": "zdi-disclosures@trendmicro.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-03-29T19:15:21.530", "references": [ { "source": "zdi-disclosures@trendmicro.com", "tags": [ "Release Notes" ], "url": "https://www.win-rar.com/singlenewsview.html?\u0026L=0\u0026tx_ttnews%5Btt_news%5D=216\u0026cHash=983dfbcc83fb1b64a5f792891a281709" }, { "source": "zdi-disclosures@trendmicro.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-092/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://www.win-rar.com/singlenewsview.html?\u0026L=0\u0026tx_ttnews%5Btt_news%5D=216\u0026cHash=983dfbcc83fb1b64a5f792891a281709" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-092/" } ], "sourceIdentifier": "zdi-disclosures@trendmicro.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "zdi-disclosures@trendmicro.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-08-18 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple directory traversal vulnerabilities in LHA 1.14 allow remote attackers or local users to create arbitrary files via an LHA archive containing filenames with (1) .. sequences or (2) absolute pathnames with double leading slashes ("//absolute/path").
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFE4FA19-F2EA-4292-A441-2E4A39366942", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "FA5D7FD1-D5AB-4987-801A-FA464C31298A", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "772710C7-41FE-47E2-B0D7-A3C8D36C8808", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3:*:*:*:*:*:*:*", "matchCriteriaId": "7358AD98-44C1-4CC4-BD50-CFF3822F3A96", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "AAA1C283-E518-4BC6-BBF0-FCE09F9E0F17", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "5B8A74FB-07B0-42D6-ABF3-D7A073A329E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "49668AFD-4821-4D5A-BEBD-DF55A8AB58C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "57E0BFFD-D777-43A5-AEE8-765F55C86E93", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.6_sp1:*:*:*:*:*:*:*", "matchCriteriaId": "DAF9A151-6EBF-4760-A154-A34FF7C9E632", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "CA12B965-672C-444D-9774-0F76FE47EA29", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "E6C9B32C-5EC9-46BD-AA77-F414A143576C", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "823C27EB-C00F-4A7E-B832-013A50A1EE2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "BD217379-28E7-465E-843D-E7204EE0E89F", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.13:*:*:*:*:*:*:*", "matchCriteriaId": "EB96CB8A-59F3-4624-B2BA-687ECF929B79", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.51:*:linux_gateways:*:*:*:*:*", "matchCriteriaId": "6CC9AA17-3EF4-4BC5-9E29-5A6525B9AC51", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.51:*:linux_servers:*:*:*:*:*", "matchCriteriaId": "A9C60C23-FC4D-4D14-B3E3-ECD797888AB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.51:*:linux_workstations:*:*:*:*:*", "matchCriteriaId": "D04E2381-68CB-455F-8878-17C8E4112C95", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.52:*:linux_gateways:*:*:*:*:*", "matchCriteriaId": "4AE00A20-8152-48D9-9AC4-EA359284E635", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.52:*:linux_servers:*:*:*:*:*", "matchCriteriaId": "6B334073-9FF3-4F75-8702-51DB6937B7F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.52:*:linux_workstations:*:*:*:*:*", "matchCriteriaId": "2D553EF0-6A08-4DD0-A301-99AADAFBFFBB", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:4.60:*:samba_servers:*:*:*:*:*", "matchCriteriaId": "C8C41338-0651-425E-A823-C8CBD91977D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.5:*:client_security:*:*:*:*:*", "matchCriteriaId": "46F72328-7B69-4A1B-A065-E65544F27A75", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.41:*:mimesweeper:*:*:*:*:*", "matchCriteriaId": "2BA28970-0DB9-433E-83A1-36BF05DB062A", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.41:*:windows_servers:*:*:*:*:*", "matchCriteriaId": "C0D25A1D-2B31-4B29-96FE-A793F8244F66", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.41:*:workstations:*:*:*:*:*", "matchCriteriaId": "AC90ADFD-32FE-4EA1-9583-5EFE585152CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.42:*:mimesweeper:*:*:*:*:*", "matchCriteriaId": "B490FC59-616A-4F90-95D8-50F9C0D6CB40", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.42:*:windows_servers:*:*:*:*:*", "matchCriteriaId": "858468E0-4208-4703-A3AA-4BF6CC254DDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.42:*:workstations:*:*:*:*:*", "matchCriteriaId": "4E26052D-35B8-44E7-8F66-442BA55F4483", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:5.52:*:client_security:*:*:*:*:*", "matchCriteriaId": "CBA4A9B7-626A-4539-852F-96C49D860E41", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:6.21:*:ms_exchange:*:*:*:*:*", "matchCriteriaId": "19828867-7079-4233-A3B8-BF7A3052FB8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:2003:*:*:*:*:*:*:*", "matchCriteriaId": "831F0C4D-C85F-46DA-BC9E-D3F56DE2B085", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_anti-virus:2004:*:*:*:*:*:*:*", "matchCriteriaId": "7F996B07-8B07-42A6-86FC-B5B55F708861", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_for_firewalls:6.20:*:*:*:*:*:*:*", "matchCriteriaId": "119D5A71-E7C2-4603-9D78-A161D82BC2D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_internet_security:2003:*:*:*:*:*:*:*", "matchCriteriaId": "6689D4E1-F8DC-46D9-BA35-4E4AE9C28456", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_internet_security:2004:*:*:*:*:*:*:*", "matchCriteriaId": "0429B86A-F228-44E8-ABBB-D57BEE3679F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_personal_express:4.5:*:*:*:*:*:*:*", "matchCriteriaId": "72DE7015-C1FF-4803-8B28-5AF5ECC3AAB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_personal_express:4.6:*:*:*:*:*:*:*", "matchCriteriaId": "D04F7296-3290-40D1-9CFB-E52FADAE5719", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:f-secure_personal_express:4.7:*:*:*:*:*:*:*", "matchCriteriaId": "B9A0DDB6-4B86-430E-879A-C835DBB96C42", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.31:*:*:*:*:*:*:*", "matchCriteriaId": "AC782BFC-6BA0-4823-8A6D-F7D83F55393C", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.32:*:*:*:*:*:*:*", "matchCriteriaId": "E1B09025-47B9-4F77-9DA6-80885E9A4EC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.20:*:*:*:*:*:*:*", "matchCriteriaId": "C1011521-AEF2-40EB-B671-66B20FF01CC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:lha:1.14i-9:*:i386:*:*:*:*:*", "matchCriteriaId": "EB59539A-8973-45C8-A553-1B524DA43937", "vulnerable": true }, { "criteria": "cpe:2.3:a:sgi:propack:2.4:*:*:*:*:*:*:*", "matchCriteriaId": "0702A32E-E577-403C-B4D9-15037D7100A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "29DC217F-C257-4A3C-9CBD-08010C30BEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:stalker:cgpmcafee:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "FC4CB399-2E2F-4A73-BA41-3EFB0DBDC404", "vulnerable": true }, { "criteria": "cpe:2.3:a:tsugio_okamoto:lha:1.14:*:*:*:*:*:*:*", "matchCriteriaId": "081C75A4-FDB1-4941-8276-985570632A82", "vulnerable": true }, { "criteria": "cpe:2.3:a:tsugio_okamoto:lha:1.15:*:*:*:*:*:*:*", "matchCriteriaId": "A623BD1B-DB9A-4545-9970-E3492AA39A33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tsugio_okamoto:lha:1.17:*:*:*:*:*:*:*", "matchCriteriaId": "8984B914-9850-405C-AAE6-A7C266F13BA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:winzip:winzip:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "523ADB29-C3D5-4C06-89B6-22B5FC68C240", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*", "matchCriteriaId": "3C84296C-2C8A-4DCD-9751-52951F8BEA9F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple directory traversal vulnerabilities in LHA 1.14 allow remote attackers or local users to create arbitrary files via an LHA archive containing filenames with (1) .. sequences or (2) absolute pathnames with double leading slashes (\"//absolute/path\")." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de atravesamiento de directorios en LHA 1.14 permite a atacantes locales o usuarios locales crear ficheros arbitrarios mediante un archivo LHA conteniendo nombres de fichero con secuencias (1) \"..\" (punto punto) o (2) rutas absolutas con barra inicial doble (\"//ruta/absoluta\")." } ], "id": "CVE-2004-0235", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-08-18T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000840" }, { "source": "cve@mitre.org", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020776.html" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=108422737918885\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200405-02.xml" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2004/dsa-515" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/archives/fedora-announce-list/2004-May/msg00005.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2004-178.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2004-179.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/10243" }, { "source": "cve@mitre.org", "url": "https://bugzilla.fedora.us/show_bug.cgi?id=1833" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16013" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10409" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A978" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000840" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020776.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=108422737918885\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200405-02.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2004/dsa-515" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/archives/fedora-announce-list/2004-May/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2004-178.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2004-179.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/10243" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.fedora.us/show_bug.cgi?id=1833" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16013" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10409" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A978" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-07-25 23:04
Modified
2025-04-03 01:03
Severity ?
Summary
Stack-based buffer overflow in lzh.fmt in WinRAR 3.00 through 3.60 beta 6 allows remote attackers to execute arbitrary code via a long filename in a LHA archive.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
rarlab | winrar | 3.0.0 | |
rarlab | winrar | 3.10 | |
rarlab | winrar | 3.10_beta3 | |
rarlab | winrar | 3.10_beta5 | |
rarlab | winrar | 3.11 | |
rarlab | winrar | 3.20 | |
rarlab | winrar | 3.30 | |
rarlab | winrar | 3.40 | |
rarlab | winrar | 3.41 | |
rarlab | winrar | 3.42 | |
rarlab | winrar | 3.50 | |
rarlab | winrar | 3.51 | |
rarlab | winrar | 3.60_beta1 | |
rarlab | winrar | 3.60_beta2 | |
rarlab | winrar | 3.60_beta3 | |
rarlab | winrar | 3.60_beta4 | |
rarlab | winrar | 3.60_beta5 | |
rarlab | winrar | 3.60_beta6 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rarlab:winrar:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "53BDA79B-B1CC-479C-A1DA-41DDDE098EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.10:*:*:*:*:*:*:*", "matchCriteriaId": "16A1E0B7-020F-4110-9603-58CA8CEB7581", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.10_beta3:*:*:*:*:*:*:*", "matchCriteriaId": "AE627C32-9F4B-4D36-AC4B-5D01A47BFD88", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.10_beta5:*:*:*:*:*:*:*", "matchCriteriaId": "3366C2D1-F30A-413B-94A2-7DBDACC083EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.11:*:*:*:*:*:*:*", "matchCriteriaId": "8585089C-A6B5-4BFE-BEA3-133B94F24F72", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.20:*:*:*:*:*:*:*", "matchCriteriaId": "C1011521-AEF2-40EB-B671-66B20FF01CC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.30:*:*:*:*:*:*:*", "matchCriteriaId": "B73F9019-EA47-4962-B080-C65ED42000F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.40:*:*:*:*:*:*:*", "matchCriteriaId": "9843D850-DC4C-49D5-AAEB-EF75FB54F08C", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.41:*:*:*:*:*:*:*", "matchCriteriaId": "2C9B3100-2223-4201-AE29-B4A4EAFF2595", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.42:*:*:*:*:*:*:*", "matchCriteriaId": "7F95B556-A1B4-4AEF-8223-5ED44819515D", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.50:*:*:*:*:*:*:*", "matchCriteriaId": "C89BC32A-6D3B-4B83-BD49-856233EEF51C", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.51:*:*:*:*:*:*:*", "matchCriteriaId": "F5611BDE-8CB6-4FCE-BB12-D16BF60BCE64", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.60_beta1:*:*:*:*:*:*:*", "matchCriteriaId": "769CCD65-7409-4685-A228-AE69BEBA5795", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.60_beta2:*:*:*:*:*:*:*", "matchCriteriaId": "2229C927-EB0A-4EE4-95FB-7F7EEAA0E5C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.60_beta3:*:*:*:*:*:*:*", "matchCriteriaId": "D721A91B-17D8-4AAF-AC2E-1D9ABEBC39B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.60_beta4:*:*:*:*:*:*:*", "matchCriteriaId": "F097ED7F-E004-4163-AE7D-0EA89517709C", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.60_beta5:*:*:*:*:*:*:*", "matchCriteriaId": "9C152F70-47A9-466F-8299-4A9C36540A44", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.60_beta6:*:*:*:*:*:*:*", "matchCriteriaId": "A1860DC9-69C8-4464-A15F-1BF38A2845A6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in lzh.fmt in WinRAR 3.00 through 3.60 beta 6 allows remote attackers to execute arbitrary code via a long filename in a LHA archive." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en pila en lzh.fmt en WinRAR 3.00 hasta 3.60 beta 6 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un nombre de archivo en un archivo LHA." } ], "id": "CVE-2006-3845", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2006-07-25T23:04:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://hustlelabs.com/advisories/04072006_rarlabs.pdf" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/21080" }, { "source": "cve@mitre.org", "url": "http://www.rarlabs.com/rarnew.htm" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/19043" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/2867" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27815" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://hustlelabs.com/advisories/04072006_rarlabs.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/21080" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.rarlabs.com/rarnew.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/19043" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/2867" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27815" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-05-03 03:15
Modified
2025-06-20 18:13
Severity ?
Summary
RARLAB WinRAR Recovery Volume Improper Validation of Array Index Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the processing of recovery volumes. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-21233.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rarlab:winrar:*:*:*:*:*:*:*:*", "matchCriteriaId": "A586AE4C-6F08-4E96-B74C-AA0A7BF4F2DD", "versionEndExcluding": "6.23", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "RARLAB WinRAR Recovery Volume Improper Validation of Array Index Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the processing of recovery volumes. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-21233." }, { "lang": "es", "value": "Validaci\u00f3n incorrecta del volumen de recuperaci\u00f3n de RARLAB WinRAR de la vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del \u00edndice de matriz. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en instalaciones afectadas de RARLAB WinRAR. Se requiere la interacci\u00f3n del usuario para aprovechar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica existe en el procesamiento de vol\u00famenes de recuperaci\u00f3n. El problema se debe a la falta de una validaci\u00f3n adecuada de los datos proporcionados por el usuario, lo que puede provocar un acceso a la memoria m\u00e1s all\u00e1 del final de un b\u00fafer asignado. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual. Era ZDI-CAN-21233." } ], "id": "CVE-2023-40477", "lastModified": "2025-06-20T18:13:59.143", "metrics": { "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "zdi-disclosures@trendmicro.com", "type": "Secondary" } ] }, "published": "2024-05-03T03:15:20.473", "references": [ { "source": "zdi-disclosures@trendmicro.com", "tags": [ "Release Notes" ], "url": "https://www.win-rar.com/singlenewsview.html?\u0026L=0\u0026tx_ttnews%5Btt_news%5D=232\u0026cHash=c5bf79590657e32554c6683296a8e8aa" }, { "source": "zdi-disclosures@trendmicro.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1152/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://www.win-rar.com/singlenewsview.html?\u0026L=0\u0026tx_ttnews%5Btt_news%5D=232\u0026cHash=c5bf79590657e32554c6683296a8e8aa" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1152/" } ], "sourceIdentifier": "zdi-disclosures@trendmicro.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-129" } ], "source": "zdi-disclosures@trendmicro.com", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2005-01-10 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
WinRAR 3.40, and possibly earlier versions, allows remote attackers to execute arbitrary code via a ZIP file containing a file with a long filename, possibly causing an integer overflow that leads to a buffer overflow.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rarlab:winrar:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "53BDA79B-B1CC-479C-A1DA-41DDDE098EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.10:*:*:*:*:*:*:*", "matchCriteriaId": "16A1E0B7-020F-4110-9603-58CA8CEB7581", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.10_beta3:*:*:*:*:*:*:*", "matchCriteriaId": "AE627C32-9F4B-4D36-AC4B-5D01A47BFD88", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.10_beta5:*:*:*:*:*:*:*", "matchCriteriaId": "3366C2D1-F30A-413B-94A2-7DBDACC083EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.11:*:*:*:*:*:*:*", "matchCriteriaId": "8585089C-A6B5-4BFE-BEA3-133B94F24F72", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.20:*:*:*:*:*:*:*", "matchCriteriaId": "C1011521-AEF2-40EB-B671-66B20FF01CC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.40:*:*:*:*:*:*:*", "matchCriteriaId": "9843D850-DC4C-49D5-AAEB-EF75FB54F08C", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.41:*:*:*:*:*:*:*", "matchCriteriaId": "2C9B3100-2223-4201-AE29-B4A4EAFF2595", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "WinRAR 3.40, and possibly earlier versions, allows remote attackers to execute arbitrary code via a ZIP file containing a file with a long filename, possibly causing an integer overflow that leads to a buffer overflow." } ], "id": "CVE-2004-1254", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-01-10T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://www.frsirt.com/exploits/20041217.Winrar.c.php" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18569" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.frsirt.com/exploits/20041217.Winrar.c.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18569" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-09-01 16:30
Modified
2025-04-09 00:30
Severity ?
Summary
Multiple unspecified vulnerabilities in RARLAB WinRAR before 3.71 have unknown impact and attack vectors related to crafted (1) ACE, (2) ARJ, (3) BZ2, (4) CAB, (5) GZ, (6) LHA, (7) RAR, (8) TAR, or (9) ZIP files, as demonstrated by the OUSPG PROTOS GENOME test suite for Archive Formats.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
rarlab | winrar | * | |
rarlab | winrar | 2.90 | |
rarlab | winrar | 3.0.0 | |
rarlab | winrar | 3.10 | |
rarlab | winrar | 3.10_beta3 | |
rarlab | winrar | 3.10_beta5 | |
rarlab | winrar | 3.11 | |
rarlab | winrar | 3.20 | |
rarlab | winrar | 3.30 | |
rarlab | winrar | 3.40 | |
rarlab | winrar | 3.41 | |
rarlab | winrar | 3.42 | |
rarlab | winrar | 3.50 | |
rarlab | winrar | 3.51 | |
rarlab | winrar | 3.60_beta1 | |
rarlab | winrar | 3.60_beta2 | |
rarlab | winrar | 3.60_beta3 | |
rarlab | winrar | 3.60_beta4 | |
rarlab | winrar | 3.60_beta5 | |
rarlab | winrar | 3.60_beta6 | |
rarlab | winrar | 3.60_beta7 | |
rarlab | winrar | 3.60_beta8 | |
rarlab | winrar | 3.61 | |
rarlab | winrar | 3.62 | |
rarlab | winrar | 3.70_beta1 | |
rarlab | winrar | 3.70_beta2 | |
rarlab | winrar | 3.70_beta3 | |
rarlab | winrar | 3.70_beta4 | |
rarlab | winrar | 3.70_beta5 | |
rarlab | winrar | 3.70_beta6 | |
rarlab | winrar | 3.70_beta7 | |
rarlab | winrar | 3.70_beta8 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rarlab:winrar:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F37E494-C901-414A-9F61-BA2109E6E4EB", "versionEndIncluding": "3.70", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:2.90:*:*:*:*:*:*:*", "matchCriteriaId": "0FFE81D1-EE81-415D-ACE0-F97AF38BE007", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "53BDA79B-B1CC-479C-A1DA-41DDDE098EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.10:*:*:*:*:*:*:*", "matchCriteriaId": "16A1E0B7-020F-4110-9603-58CA8CEB7581", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.10_beta3:*:*:*:*:*:*:*", "matchCriteriaId": "AE627C32-9F4B-4D36-AC4B-5D01A47BFD88", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.10_beta5:*:*:*:*:*:*:*", "matchCriteriaId": "3366C2D1-F30A-413B-94A2-7DBDACC083EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.11:*:*:*:*:*:*:*", "matchCriteriaId": "8585089C-A6B5-4BFE-BEA3-133B94F24F72", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.20:*:*:*:*:*:*:*", "matchCriteriaId": "C1011521-AEF2-40EB-B671-66B20FF01CC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.30:*:*:*:*:*:*:*", "matchCriteriaId": "B73F9019-EA47-4962-B080-C65ED42000F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.40:*:*:*:*:*:*:*", "matchCriteriaId": "9843D850-DC4C-49D5-AAEB-EF75FB54F08C", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.41:*:*:*:*:*:*:*", "matchCriteriaId": "2C9B3100-2223-4201-AE29-B4A4EAFF2595", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.42:*:*:*:*:*:*:*", "matchCriteriaId": "7F95B556-A1B4-4AEF-8223-5ED44819515D", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.50:*:*:*:*:*:*:*", "matchCriteriaId": "C89BC32A-6D3B-4B83-BD49-856233EEF51C", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.51:*:*:*:*:*:*:*", "matchCriteriaId": "F5611BDE-8CB6-4FCE-BB12-D16BF60BCE64", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.60_beta1:*:*:*:*:*:*:*", "matchCriteriaId": "769CCD65-7409-4685-A228-AE69BEBA5795", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.60_beta2:*:*:*:*:*:*:*", "matchCriteriaId": "2229C927-EB0A-4EE4-95FB-7F7EEAA0E5C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.60_beta3:*:*:*:*:*:*:*", "matchCriteriaId": "D721A91B-17D8-4AAF-AC2E-1D9ABEBC39B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.60_beta4:*:*:*:*:*:*:*", "matchCriteriaId": "F097ED7F-E004-4163-AE7D-0EA89517709C", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.60_beta5:*:*:*:*:*:*:*", "matchCriteriaId": "9C152F70-47A9-466F-8299-4A9C36540A44", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.60_beta6:*:*:*:*:*:*:*", "matchCriteriaId": "A1860DC9-69C8-4464-A15F-1BF38A2845A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.60_beta7:*:*:*:*:*:*:*", "matchCriteriaId": "25F16922-1BA6-4CDC-B2B3-0E68C13AD815", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.60_beta8:*:*:*:*:*:*:*", "matchCriteriaId": "8C71933B-40E9-459C-84D4-B6E90DD7C2C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.61:*:*:*:*:*:*:*", "matchCriteriaId": "56569258-AAA1-4C61-A9C2-C1F310BC710E", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.62:*:*:*:*:*:*:*", "matchCriteriaId": "2EB470C6-902C-4836-BC31-16532FD1E5C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.70_beta1:*:*:*:*:*:*:*", "matchCriteriaId": "A941C7F1-8577-4CE1-9852-B2A4C06F23A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.70_beta2:*:*:*:*:*:*:*", "matchCriteriaId": "2821BC83-1A0C-4071-93F7-9B0ADB503038", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.70_beta3:*:*:*:*:*:*:*", "matchCriteriaId": "BD80CDF8-4FEA-4B72-BEEF-3E645B4059F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.70_beta4:*:*:*:*:*:*:*", "matchCriteriaId": "A9EAA3B3-7AA5-4429-9D2F-27DA958513F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.70_beta5:*:*:*:*:*:*:*", "matchCriteriaId": "3337C986-BA06-4A2F-B0A2-A4E128A36214", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.70_beta6:*:*:*:*:*:*:*", "matchCriteriaId": "10D394F7-4674-461C-BFB4-F4FD6B73F3EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.70_beta7:*:*:*:*:*:*:*", "matchCriteriaId": "CCC6E995-0B48-4F52-9516-E07C31220978", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.70_beta8:*:*:*:*:*:*:*", "matchCriteriaId": "EFA1E9B1-C55F-4EB6-A086-6C077C8713EE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in RARLAB WinRAR before 3.71 have unknown impact and attack vectors related to crafted (1) ACE, (2) ARJ, (3) BZ2, (4) CAB, (5) GZ, (6) LHA, (7) RAR, (8) TAR, or (9) ZIP files, as demonstrated by the OUSPG PROTOS GENOME test suite for Archive Formats." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidad no especificadas en RARLAB WinRAR anterior v3.71 tienen impacto desconocido y vectores atacados relacionados con la manipulaci\u00f3n de ficheros (1) ACE, (2) ARJ, (3) BZ2, (4) CAB, (5) GZ, (6) LHA, (7) RAR, (8) TAR, o (9) ZIP, como se ha demostrado mediante la suite para el testeo de formatos de archivo PROTOS GENOME." } ], "id": "CVE-2008-7144", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-09-01T16:30:00.563", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/43439" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29407" }, { "source": "cve@mitre.org", "url": "http://www.cert.fi/haavoittuvuudet/joint-advisory-archive-formats.html" }, { "source": "cve@mitre.org", "url": "http://www.ee.oulu.fi/research/ouspg/protos/testing/c10/archive/" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/0916/references" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41251" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/43439" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29407" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.cert.fi/haavoittuvuudet/joint-advisory-archive-formats.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ee.oulu.fi/research/ouspg/protos/testing/c10/archive/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/0916/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41251" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-06-21 01:15
Modified
2025-06-25 19:03
Severity ?
Summary
RARLAB WinRAR Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the handling of file paths within archive files. A crafted file path can cause the process to traverse to unintended directories. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-27198.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rarlab:winrar:*:*:*:*:*:*:*:*", "matchCriteriaId": "E5B3E0ED-B444-468E-804E-7664C75CE9EA", "versionEndExcluding": "7.12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "RARLAB WinRAR Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of file paths within archive files. A crafted file path can cause the process to traverse to unintended directories. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-27198." }, { "lang": "es", "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo por Directory Traversal en RARLAB WinRAR. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en las instalaciones afectadas de RARLAB WinRAR. Para explotar esta vulnerabilidad, se requiere la interacci\u00f3n del usuario, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica se encuentra en la gesti\u00f3n de rutas de archivo dentro de los archivos comprimidos. Una ruta de archivo manipulada puede provocar que el proceso acceda a directorios no deseados. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del usuario actual. Era ZDI-CAN-27198.\n" } ], "id": "CVE-2025-6218", "lastModified": "2025-06-25T19:03:33.817", "metrics": { "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "zdi-disclosures@trendmicro.com", "type": "Secondary" } ] }, "published": "2025-06-21T01:15:29.123", "references": [ { "source": "zdi-disclosures@trendmicro.com", "tags": [ "Release Notes" ], "url": "https://www.win-rar.com/singlenewsview.html?\u0026tx_ttnews%5Btt_news%5D=276\u0026cHash=388885bd3908a40726f535c026f94eb6" }, { "source": "zdi-disclosures@trendmicro.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-409/" } ], "sourceIdentifier": "zdi-disclosures@trendmicro.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "zdi-disclosures@trendmicro.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-02-05 20:29
Modified
2024-11-21 04:01
Severity ?
Summary
In WinRAR versions prior to and including 5.61, there is path traversal vulnerability when crafting the filename field of the ACE format. The UNACE module (UNACEV2.dll) creates files and folders as written in the filename field even when WinRAR validator noticed the traversal attempt and requestd to abort the extraction process. the operation is cancelled only after the folders and files were created but prior to them being written, therefore allowing the attacker to create empty files and folders everywhere in the file system.
References
▶ | URL | Tags | |
---|---|---|---|
cve@checkpoint.com | http://www.securityfocus.com/bid/106948 | Third Party Advisory, VDB Entry | |
cve@checkpoint.com | https://research.checkpoint.com/extracting-code-execution-from-winrar/ | Exploit, Third Party Advisory | |
cve@checkpoint.com | https://www.win-rar.com/whatsnew.html | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/106948 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://research.checkpoint.com/extracting-code-execution-from-winrar/ | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.win-rar.com/whatsnew.html | Release Notes, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rarlab:winrar:*:*:*:*:*:*:*:*", "matchCriteriaId": "7EA0C7CE-99E6-4C92-AE89-6C6A8DF92126", "versionEndIncluding": "5.61", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In WinRAR versions prior to and including 5.61, there is path traversal vulnerability when crafting the filename field of the ACE format. The UNACE module (UNACEV2.dll) creates files and folders as written in the filename field even when WinRAR validator noticed the traversal attempt and requestd to abort the extraction process. the operation is cancelled only after the folders and files were created but prior to them being written, therefore allowing the attacker to create empty files and folders everywhere in the file system." }, { "lang": "es", "value": "En WinRAR, en versiones anteriores e incluyendo a la 5.61, hay una vulnerabilidad de salto de directorio al manipular el campo \"filename\" del formato ACE. El m\u00f3dulo UNACE (UNACEV2.dll) crea archivos y carpetas tal y como est\u00e1n escritos en el campo \"filename\", incluso cuando el validador de WinRAR descubr\u00eda el intento de salto y solicitaba abortar el proceso de extracci\u00f3n. La operaci\u00f3n se cancelaba solo tras crear las carpetas y archivos, pero antes de que se escribiesen, permitiendo as\u00ed que el atacante cree archivos y carpetas vac\u00edos en cualquier lugar del sistema de archivos." } ], "id": "CVE-2018-20251", "lastModified": "2024-11-21T04:01:10.330", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-02-05T20:29:00.273", "references": [ { "source": "cve@checkpoint.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106948" }, { "source": "cve@checkpoint.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://research.checkpoint.com/extracting-code-execution-from-winrar/" }, { "source": "cve@checkpoint.com", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.win-rar.com/whatsnew.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106948" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://research.checkpoint.com/extracting-code-execution-from-winrar/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://www.win-rar.com/whatsnew.html" } ], "sourceIdentifier": "cve@checkpoint.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-693" } ], "source": "cve@checkpoint.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
The Repair Archive command in WinRAR 3.40 allows remote attackers to cause a denial of service (application crash) via a corrupt ZIP archive.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rarlab:winrar:2.90:*:*:*:*:*:*:*", "matchCriteriaId": "0FFE81D1-EE81-415D-ACE0-F97AF38BE007", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "53BDA79B-B1CC-479C-A1DA-41DDDE098EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.10:*:*:*:*:*:*:*", "matchCriteriaId": "16A1E0B7-020F-4110-9603-58CA8CEB7581", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.10_beta3:*:*:*:*:*:*:*", "matchCriteriaId": "AE627C32-9F4B-4D36-AC4B-5D01A47BFD88", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.10_beta5:*:*:*:*:*:*:*", "matchCriteriaId": "3366C2D1-F30A-413B-94A2-7DBDACC083EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.11:*:*:*:*:*:*:*", "matchCriteriaId": "8585089C-A6B5-4BFE-BEA3-133B94F24F72", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.20:*:*:*:*:*:*:*", "matchCriteriaId": "C1011521-AEF2-40EB-B671-66B20FF01CC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:rarlab:winrar:3.40:*:*:*:*:*:*:*", "matchCriteriaId": "9843D850-DC4C-49D5-AAEB-EF75FB54F08C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Repair Archive command in WinRAR 3.40 allows remote attackers to cause a denial of service (application crash) via a corrupt ZIP archive." } ], "id": "CVE-2004-1495", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2004-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=109941351432699\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://secunia.com/advisories/13070" }, { "source": "cve@mitre.org", "url": "http://www.rarlabs.com/rarnew.htm" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/11581" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17937" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=109941351432699\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://secunia.com/advisories/13070" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.rarlabs.com/rarnew.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/11581" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17937" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2018-20252 (GCVE-0-2018-20252)
Vulnerability from cvelistv5
Published
2019-02-05 20:00
Modified
2024-09-16 18:24
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-787 - Out-of-bounds Write
Summary
In WinRAR versions prior to and including 5.60, there is an out-of-bounds write vulnerability during parsing of crafted ACE and RAR archive formats. Successful exploitation could lead to arbitrary code execution in the context of the current user.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Check Point Software Technologies Ltd. | WinRAR |
Version: All versions prior and including 5.60 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T11:58:19.176Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://research.checkpoint.com/extracting-code-execution-from-winrar/" }, { "name": "106948", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106948" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.win-rar.com/whatsnew.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "WinRAR", "vendor": "Check Point Software Technologies Ltd.", "versions": [ { "status": "affected", "version": "All versions prior and including 5.60" } ] } ], "datePublic": "2019-02-05T00:00:00", "descriptions": [ { "lang": "en", "value": "In WinRAR versions prior to and including 5.60, there is an out-of-bounds write vulnerability during parsing of crafted ACE and RAR archive formats. Successful exploitation could lead to arbitrary code execution in the context of the current user." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787: Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-03-14T17:57:01", "orgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "shortName": "checkpoint" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://research.checkpoint.com/extracting-code-execution-from-winrar/" }, { "name": "106948", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106948" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.win-rar.com/whatsnew.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@checkpoint.com", "DATE_PUBLIC": "2019-02-05T00:00:00", "ID": "CVE-2018-20252", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "WinRAR", "version": { "version_data": [ { "version_value": "All versions prior and including 5.60" } ] } } ] }, "vendor_name": "Check Point Software Technologies Ltd." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In WinRAR versions prior to and including 5.60, there is an out-of-bounds write vulnerability during parsing of crafted ACE and RAR archive formats. Successful exploitation could lead to arbitrary code execution in the context of the current user." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-787: Out-of-bounds Write" } ] } ] }, "references": { "reference_data": [ { "name": "https://research.checkpoint.com/extracting-code-execution-from-winrar/", "refsource": "MISC", "url": "https://research.checkpoint.com/extracting-code-execution-from-winrar/" }, { "name": "106948", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106948" }, { "name": "https://www.win-rar.com/whatsnew.html", "refsource": "MISC", "url": "https://www.win-rar.com/whatsnew.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "assignerShortName": "checkpoint", "cveId": "CVE-2018-20252", "datePublished": "2019-02-05T20:00:00Z", "dateReserved": "2018-12-19T00:00:00", "dateUpdated": "2024-09-16T18:24:07.685Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-30370 (GCVE-0-2024-30370)
Vulnerability from cvelistv5
Published
2024-04-02 20:28
Modified
2024-08-02 01:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-693 - Protection Mechanism Failure
Summary
RARLAB WinRAR Mark-Of-The-Web Bypass Vulnerability. This vulnerability allows remote attackers to bypass the Mark-Of-The-Web protection mechanism on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must perform a specific action on a malicious page.
The specific flaw exists within the archive extraction functionality. A crafted archive entry can cause the creation of an arbitrary file without the Mark-Of-The-Web. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current user. Was ZDI-CAN-23156.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-30370", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-06T19:17:18.746474Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-06T19:17:39.956Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T01:32:07.042Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ZDI-24-357", "tags": [ "x_research-advisory", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-357/" }, { "name": "vendor-provided URL", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.rarlab.com/rarnew.htm#27.%20Busgs%20fixed" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "WinRAR", "vendor": "RARLAB", "versions": [ { "status": "affected", "version": "7.00 beta 4 (64-bit)" } ] } ], "dateAssigned": "2024-03-26T14:40:42.715-05:00", "datePublic": "2024-04-01T13:31:49.166-05:00", "descriptions": [ { "lang": "en", "value": "RARLAB WinRAR Mark-Of-The-Web Bypass Vulnerability. This vulnerability allows remote attackers to bypass the Mark-Of-The-Web protection mechanism on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must perform a specific action on a malicious page.\n\nThe specific flaw exists within the archive extraction functionality. A crafted archive entry can cause the creation of an arbitrary file without the Mark-Of-The-Web. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current user. Was ZDI-CAN-23156." } ], "metrics": [ { "cvssV3_0": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-693", "description": "CWE-693: Protection Mechanism Failure", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-02T20:28:47.578Z", "orgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "shortName": "zdi" }, "references": [ { "name": "ZDI-24-357", "tags": [ "x_research-advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-357/" }, { "name": "vendor-provided URL", "tags": [ "vendor-advisory" ], "url": "https://www.rarlab.com/rarnew.htm#27.%20Busgs%20fixed" } ], "source": { "lang": "en", "value": "Orange Tsai(@orange.8361) and NiNi (@terrynini38514) from DEVCORE Research Team" }, "title": "RARLAB WinRAR Mark-Of-The-Web Bypass Vulnerability" } }, "cveMetadata": { "assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "assignerShortName": "zdi", "cveId": "CVE-2024-30370", "datePublished": "2024-04-02T20:28:47.578Z", "dateReserved": "2024-03-26T18:52:36.419Z", "dateUpdated": "2024-08-02T01:32:07.042Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2005-0331 (GCVE-0-2005-0331)
Vulnerability from cvelistv5
Published
2005-02-10 05:00
Modified
2024-08-07 21:13
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Directory traversal vulnerability in WinRAR 3.42 and earlier, when the user clicks on the ZIP file to extract it, allows remote attackers to create arbitrary files via a ... (triple dot) in the filename of the ZIP file.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T21:13:54.041Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "12422", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/12422" }, { "name": "20050202 7a69Adv#21 - WinRAR unpack one-folder path disclosure", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=110737609604210\u0026w=2" }, { "name": "winrar-dotdotdotdirectory-traversal(20585)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20585" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-02-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in WinRAR 3.42 and earlier, when the user clicks on the ZIP file to extract it, allows remote attackers to create arbitrary files via a ... (triple dot) in the filename of the ZIP file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "12422", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/12422" }, { "name": "20050202 7a69Adv#21 - WinRAR unpack one-folder path disclosure", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=110737609604210\u0026w=2" }, { "name": "winrar-dotdotdotdirectory-traversal(20585)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20585" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-0331", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Directory traversal vulnerability in WinRAR 3.42 and earlier, when the user clicks on the ZIP file to extract it, allows remote attackers to create arbitrary files via a ... (triple dot) in the filename of the ZIP file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "12422", "refsource": "BID", "url": "http://www.securityfocus.com/bid/12422" }, { "name": "20050202 7a69Adv#21 - WinRAR unpack one-folder path disclosure", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=110737609604210\u0026w=2" }, { "name": "winrar-dotdotdotdirectory-traversal(20585)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20585" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-0331", "datePublished": "2005-02-10T05:00:00", "dateReserved": "2005-02-10T00:00:00", "dateUpdated": "2024-08-07T21:13:54.041Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-3845 (GCVE-0-2006-3845)
Vulnerability from cvelistv5
Published
2006-07-25 23:00
Modified
2024-08-07 18:48
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Stack-based buffer overflow in lzh.fmt in WinRAR 3.00 through 3.60 beta 6 allows remote attackers to execute arbitrary code via a long filename in a LHA archive.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T18:48:39.247Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "21080", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21080" }, { "name": "19043", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/19043" }, { "name": "winrar-lha-bo(27815)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27815" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.rarlabs.com/rarnew.htm" }, { "name": "ADV-2006-2867", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/2867" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://hustlelabs.com/advisories/04072006_rarlabs.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-07-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in lzh.fmt in WinRAR 3.00 through 3.60 beta 6 allows remote attackers to execute arbitrary code via a long filename in a LHA archive." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-19T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "21080", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21080" }, { "name": "19043", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/19043" }, { "name": "winrar-lha-bo(27815)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27815" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.rarlabs.com/rarnew.htm" }, { "name": "ADV-2006-2867", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/2867" }, { "tags": [ "x_refsource_MISC" ], "url": "http://hustlelabs.com/advisories/04072006_rarlabs.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-3845", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in lzh.fmt in WinRAR 3.00 through 3.60 beta 6 allows remote attackers to execute arbitrary code via a long filename in a LHA archive." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "21080", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21080" }, { "name": "19043", "refsource": "BID", "url": "http://www.securityfocus.com/bid/19043" }, { "name": "winrar-lha-bo(27815)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27815" }, { "name": "http://www.rarlabs.com/rarnew.htm", "refsource": "CONFIRM", "url": "http://www.rarlabs.com/rarnew.htm" }, { "name": "ADV-2006-2867", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/2867" }, { "name": "http://hustlelabs.com/advisories/04072006_rarlabs.pdf", "refsource": "MISC", "url": "http://hustlelabs.com/advisories/04072006_rarlabs.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-3845", "datePublished": "2006-07-25T23:00:00", "dateReserved": "2006-07-25T00:00:00", "dateUpdated": "2024-08-07T18:48:39.247Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2004-1495 (GCVE-0-2004-1495)
Vulnerability from cvelistv5
Published
2005-02-19 05:00
Modified
2024-08-08 00:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The Repair Archive command in WinRAR 3.40 allows remote attackers to cause a denial of service (application crash) via a corrupt ZIP archive.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:53:24.177Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20041102 Medium Risk Vulnerability in WinRAR", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=109941351432699\u0026w=2" }, { "name": "13070", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/13070" }, { "name": "winrar-repair-archive(17937)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17937" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.rarlabs.com/rarnew.htm" }, { "name": "11581", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/11581" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-11-02T00:00:00", "descriptions": [ { "lang": "en", "value": "The Repair Archive command in WinRAR 3.40 allows remote attackers to cause a denial of service (application crash) via a corrupt ZIP archive." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20041102 Medium Risk Vulnerability in WinRAR", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=109941351432699\u0026w=2" }, { "name": "13070", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/13070" }, { "name": "winrar-repair-archive(17937)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17937" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.rarlabs.com/rarnew.htm" }, { "name": "11581", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/11581" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-1495", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Repair Archive command in WinRAR 3.40 allows remote attackers to cause a denial of service (application crash) via a corrupt ZIP archive." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20041102 Medium Risk Vulnerability in WinRAR", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=109941351432699\u0026w=2" }, { "name": "13070", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/13070" }, { "name": "winrar-repair-archive(17937)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17937" }, { "name": "http://www.rarlabs.com/rarnew.htm", "refsource": "CONFIRM", "url": "http://www.rarlabs.com/rarnew.htm" }, { "name": "11581", "refsource": "BID", "url": "http://www.securityfocus.com/bid/11581" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-1495", "datePublished": "2005-02-19T05:00:00", "dateReserved": "2005-02-18T00:00:00", "dateUpdated": "2024-08-08T00:53:24.177Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-43650 (GCVE-0-2022-43650)
Vulnerability from cvelistv5
Published
2023-03-29 00:00
Modified
2025-02-12 16:57
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-125 - Out-of-bounds Read
Summary
This vulnerability allows remote attackers to disclose sensitive information on affected installations of RARLAB WinRAR 6.11.0.0. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of ZIP files. Crafted data in a ZIP file can trigger a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-19232.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:40:06.225Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-092/" }, { "tags": [ "x_transferred" ], "url": "https://www.win-rar.com/singlenewsview.html?\u0026L=0\u0026tx_ttnews%5Btt_news%5D=216\u0026cHash=983dfbcc83fb1b64a5f792891a281709" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-43650", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-12T16:57:04.668363Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-12T16:57:11.609Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "WinRAR", "vendor": "RARLAB", "versions": [ { "status": "affected", "version": "6.11.0.0" } ] } ], "credits": [ { "lang": "en", "value": "Bakker" } ], "descriptions": [ { "lang": "en", "value": "This vulnerability allows remote attackers to disclose sensitive information on affected installations of RARLAB WinRAR 6.11.0.0. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of ZIP files. Crafted data in a ZIP file can trigger a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-19232." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-29T00:00:00.000Z", "orgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "shortName": "zdi" }, "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-092/" }, { "url": "https://www.win-rar.com/singlenewsview.html?\u0026L=0\u0026tx_ttnews%5Btt_news%5D=216\u0026cHash=983dfbcc83fb1b64a5f792891a281709" } ] } }, "cveMetadata": { "assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "assignerShortName": "zdi", "cveId": "CVE-2022-43650", "datePublished": "2023-03-29T00:00:00.000Z", "dateReserved": "2022-10-21T00:00:00.000Z", "dateUpdated": "2025-02-12T16:57:11.609Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-20253 (GCVE-0-2018-20253)
Vulnerability from cvelistv5
Published
2019-02-13 01:00
Modified
2024-08-05 11:58
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-787 - Out-of-bounds Write
Summary
In WinRAR versions prior to and including 5.60, There is an out-of-bounds write vulnerability during parsing of a crafted LHA / LZH archive formats. Successful exploitation could lead to arbitrary code execution in the context of the current user.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Check Point Software Technologies Ltd. | WinRAR |
Version: All versions prior and including 5.60 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T11:58:19.154Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://research.checkpoint.com/extracting-code-execution-from-winrar/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.win-rar.com/whatsnew.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "WinRAR", "vendor": "Check Point Software Technologies Ltd.", "versions": [ { "status": "affected", "version": "All versions prior and including 5.60" } ] } ], "datePublic": "2019-02-12T00:00:00", "descriptions": [ { "lang": "en", "value": "In WinRAR versions prior to and including 5.60, There is an out-of-bounds write vulnerability during parsing of a crafted LHA / LZH archive formats. Successful exploitation could lead to arbitrary code execution in the context of the current user." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787: Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-03-14T17:57:01", "orgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "shortName": "checkpoint" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://research.checkpoint.com/extracting-code-execution-from-winrar/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.win-rar.com/whatsnew.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@checkpoint.com", "ID": "CVE-2018-20253", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "WinRAR", "version": { "version_data": [ { "version_value": "All versions prior and including 5.60" } ] } } ] }, "vendor_name": "Check Point Software Technologies Ltd." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In WinRAR versions prior to and including 5.60, There is an out-of-bounds write vulnerability during parsing of a crafted LHA / LZH archive formats. Successful exploitation could lead to arbitrary code execution in the context of the current user." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-787: Out-of-bounds Write" } ] } ] }, "references": { "reference_data": [ { "name": "https://research.checkpoint.com/extracting-code-execution-from-winrar/", "refsource": "MISC", "url": "https://research.checkpoint.com/extracting-code-execution-from-winrar/" }, { "name": "https://www.win-rar.com/whatsnew.html", "refsource": "MISC", "url": "https://www.win-rar.com/whatsnew.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "assignerShortName": "checkpoint", "cveId": "CVE-2018-20253", "datePublished": "2019-02-13T01:00:00", "dateReserved": "2018-12-19T00:00:00", "dateUpdated": "2024-08-05T11:58:19.154Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2005-4474 (GCVE-0-2005-4474)
Vulnerability from cvelistv5
Published
2005-12-22 01:00
Modified
2024-08-07 23:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Buffer overflow in the "Add to archive" command in WinRAR 3.51 allows user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code by tricking the user into adding a file whose filename contains a non-default code page and non-ANSI characters, as demonstrated using a Chinese filename, possibly due to buffer expansion when using the WideCharToMultiByte API. NOTE: it is not clear whether this problem can be exploited for code execution. If not, then perhaps the user-assisted nature of the attack should exclude the issue from inclusion in CVE.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T23:46:05.205Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "290", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/290" }, { "name": "20051221 WinRAR - Processing Filename Incorrectly Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/420006/100/0/threaded" }, { "name": "15999", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/15999" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-12-21T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in the \"Add to archive\" command in WinRAR 3.51 allows user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code by tricking the user into adding a file whose filename contains a non-default code page and non-ANSI characters, as demonstrated using a Chinese filename, possibly due to buffer expansion when using the WideCharToMultiByte API. NOTE: it is not clear whether this problem can be exploited for code execution. If not, then perhaps the user-assisted nature of the attack should exclude the issue from inclusion in CVE." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-19T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "290", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/290" }, { "name": "20051221 WinRAR - Processing Filename Incorrectly Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/420006/100/0/threaded" }, { "name": "15999", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/15999" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-4474", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in the \"Add to archive\" command in WinRAR 3.51 allows user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code by tricking the user into adding a file whose filename contains a non-default code page and non-ANSI characters, as demonstrated using a Chinese filename, possibly due to buffer expansion when using the WideCharToMultiByte API. NOTE: it is not clear whether this problem can be exploited for code execution. If not, then perhaps the user-assisted nature of the attack should exclude the issue from inclusion in CVE." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "290", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/290" }, { "name": "20051221 WinRAR - Processing Filename Incorrectly Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/420006/100/0/threaded" }, { "name": "15999", "refsource": "BID", "url": "http://www.securityfocus.com/bid/15999" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-4474", "datePublished": "2005-12-22T01:00:00", "dateReserved": "2005-12-21T00:00:00", "dateUpdated": "2024-08-07T23:46:05.205Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-3912 (GCVE-0-2006-3912)
Vulnerability from cvelistv5
Published
2006-07-28 00:00
Modified
2024-08-07 18:48
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Stack-based buffer overflow in the SFX module in WinRAR before 3.60 beta 8 has unspecified vectors and impact.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T18:48:39.264Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "27031", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/27031" }, { "name": "1992", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/1992" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.rarlabs.com/rarnew.htm" }, { "name": "1984", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/1984" }, { "name": "1985", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/1985" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-07-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the SFX module in WinRAR before 3.60 beta 8 has unspecified vectors and impact." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-18T16:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "27031", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/27031" }, { "name": "1992", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/1992" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.rarlabs.com/rarnew.htm" }, { "name": "1984", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/1984" }, { "name": "1985", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/1985" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-3912", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in the SFX module in WinRAR before 3.60 beta 8 has unspecified vectors and impact." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "27031", "refsource": "OSVDB", "url": "http://www.osvdb.org/27031" }, { "name": "1992", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/1992" }, { "name": "http://www.rarlabs.com/rarnew.htm", "refsource": "CONFIRM", "url": "http://www.rarlabs.com/rarnew.htm" }, { "name": "1984", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/1984" }, { "name": "1985", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/1985" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-3912", "datePublished": "2006-07-28T00:00:00", "dateReserved": "2006-07-27T00:00:00", "dateUpdated": "2024-08-07T18:48:39.264Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-31334 (GCVE-0-2025-31334)
Vulnerability from cvelistv5
Published
2025-04-03 05:27
Modified
2025-04-03 13:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-356 - Product UI does not warn user of unsafe actions
Summary
Issue that bypasses the "Mark of the Web" security warning function for files when opening a symbolic link that points to an executable file exists in WinRAR versions prior to 7.11. If a symbolic link specially crafted by an attacker is opened on the affected product, arbitrary code may be executed.
References
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-31334", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-04-03T13:51:57.341675Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-03T13:52:45.659Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "WinRAR", "vendor": "RARLAB", "versions": [ { "status": "affected", "version": "prior to 7.11" } ] } ], "descriptions": [ { "lang": "en", "value": "Issue that bypasses the \"Mark of the Web\" security warning function for files when opening a symbolic link that points to an executable file exists in WinRAR versions prior to 7.11. If a symbolic link specially crafted by an attacker is opened on the affected product, arbitrary code may be executed." } ], "metrics": [ { "cvssV3_0": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-356", "description": "Product UI does not warn user of unsafe actions", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-03T05:27:32.538Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://www.win-rar.com/start.html?\u0026L=0" }, { "url": "https://jvn.jp/en/jp/JVN59547048/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2025-31334", "datePublished": "2025-04-03T05:27:32.538Z", "dateReserved": "2025-03-27T23:41:26.316Z", "dateUpdated": "2025-04-03T13:52:45.659Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2004-0234 (GCVE-0-2004-0234)
Vulnerability from cvelistv5
Published
2004-05-05 04:00
Modified
2024-08-08 00:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple stack-based buffer overflows in the get_header function in header.c for LHA 1.14, as used in products such as Barracuda Spam Firewall, allow remote attackers or local users to execute arbitrary code via long directory or file names in an LHA archive, which triggers the overflow when testing or extracting the archive.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:10:03.930Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1015866", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015866" }, { "name": "CLA-2004:840", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000840" }, { "name": "5753", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/5753" }, { "name": "oval:org.mitre.oval:def:977", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A977" }, { "name": "FEDORA-2004-119", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://www.redhat.com/archives/fedora-announce-list/2004-May/msg00005.html" }, { "name": "20060403 Barracuda LHA archiver security bug leads to remote compromise", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2006-04/0059.html" }, { "name": "10243", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/10243" }, { "name": "ADV-2006-1220", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/1220" }, { "name": "20040501 LHa buffer overflows and directory traversal problems", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020776.html" }, { "name": "19514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/19514" }, { "name": "5754", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/5754" }, { "name": "RHSA-2004:179", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-179.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.guay-leroux.com/projects/barracuda-advisory-LHA.txt" }, { "name": "FLSA:1833", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://bugzilla.fedora.us/show_bug.cgi?id=1833" }, { "name": "DSA-515", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2004/dsa-515" }, { "name": "oval:org.mitre.oval:def:9881", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9881" }, { "name": "20040510 [Ulf Harnhammar]: LHA Advisory + Patch", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=108422737918885\u0026w=2" }, { "name": "GLSA-200405-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200405-02.xml" }, { "name": "RHSA-2004:178", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-178.html" }, { "name": "lha-multiple-bo(16012)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16012" }, { "name": "20040502 Lha local stack overflow Proof Of Concept Code", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020778.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-04-30T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple stack-based buffer overflows in the get_header function in header.c for LHA 1.14, as used in products such as Barracuda Spam Firewall, allow remote attackers or local users to execute arbitrary code via long directory or file names in an LHA archive, which triggers the overflow when testing or extracting the archive." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1015866", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015866" }, { "name": "CLA-2004:840", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000840" }, { "name": "5753", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/5753" }, { "name": "oval:org.mitre.oval:def:977", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A977" }, { "name": "FEDORA-2004-119", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://www.redhat.com/archives/fedora-announce-list/2004-May/msg00005.html" }, { "name": "20060403 Barracuda LHA archiver security bug leads to remote compromise", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2006-04/0059.html" }, { "name": "10243", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/10243" }, { "name": "ADV-2006-1220", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/1220" }, { "name": "20040501 LHa buffer overflows and directory traversal problems", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020776.html" }, { "name": "19514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/19514" }, { "name": "5754", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/5754" }, { "name": "RHSA-2004:179", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-179.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.guay-leroux.com/projects/barracuda-advisory-LHA.txt" }, { "name": "FLSA:1833", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://bugzilla.fedora.us/show_bug.cgi?id=1833" }, { "name": "DSA-515", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2004/dsa-515" }, { "name": "oval:org.mitre.oval:def:9881", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9881" }, { "name": "20040510 [Ulf Harnhammar]: LHA Advisory + Patch", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=108422737918885\u0026w=2" }, { "name": "GLSA-200405-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200405-02.xml" }, { "name": "RHSA-2004:178", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-178.html" }, { "name": "lha-multiple-bo(16012)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16012" }, { "name": "20040502 Lha local stack overflow Proof Of Concept Code", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020778.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0234", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple stack-based buffer overflows in the get_header function in header.c for LHA 1.14, as used in products such as Barracuda Spam Firewall, allow remote attackers or local users to execute arbitrary code via long directory or file names in an LHA archive, which triggers the overflow when testing or extracting the archive." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1015866", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015866" }, { "name": "CLA-2004:840", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000840" }, { "name": "5753", "refsource": "OSVDB", "url": "http://www.osvdb.org/5753" }, { "name": "oval:org.mitre.oval:def:977", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A977" }, { "name": "FEDORA-2004-119", "refsource": "FEDORA", "url": "http://www.redhat.com/archives/fedora-announce-list/2004-May/msg00005.html" }, { "name": "20060403 Barracuda LHA archiver security bug leads to remote compromise", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2006-04/0059.html" }, { "name": "10243", "refsource": "BID", "url": "http://www.securityfocus.com/bid/10243" }, { "name": "ADV-2006-1220", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/1220" }, { "name": "20040501 LHa buffer overflows and directory traversal problems", "refsource": "FULLDISC", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020776.html" }, { "name": "19514", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/19514" }, { "name": "5754", "refsource": "OSVDB", "url": "http://www.osvdb.org/5754" }, { "name": "RHSA-2004:179", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-179.html" }, { "name": "http://www.guay-leroux.com/projects/barracuda-advisory-LHA.txt", "refsource": "MISC", "url": "http://www.guay-leroux.com/projects/barracuda-advisory-LHA.txt" }, { "name": "FLSA:1833", "refsource": "FEDORA", "url": "https://bugzilla.fedora.us/show_bug.cgi?id=1833" }, { "name": "DSA-515", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2004/dsa-515" }, { "name": "oval:org.mitre.oval:def:9881", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9881" }, { "name": "20040510 [Ulf Harnhammar]: LHA Advisory + Patch", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=108422737918885\u0026w=2" }, { "name": "GLSA-200405-02", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200405-02.xml" }, { "name": "RHSA-2004:178", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-178.html" }, { "name": "lha-multiple-bo(16012)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16012" }, { "name": "20040502 Lha local stack overflow Proof Of Concept Code", "refsource": "FULLDISC", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020778.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0234", "datePublished": "2004-05-05T04:00:00", "dateReserved": "2004-03-17T00:00:00", "dateUpdated": "2024-08-08T00:10:03.930Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-125119 (GCVE-0-2014-125119)
Vulnerability from cvelistv5
Published
2025-07-25 15:59
Modified
2025-07-25 17:40
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A filename spoofing vulnerability exists in WinRAR when opening specially crafted ZIP archives. The issue arises due to inconsistencies between the Central Directory and Local File Header entries in ZIP files. When viewed in WinRAR, the file name from the Central Directory is displayed to the user, while the file from the Local File Header is extracted and executed. An attacker can leverage this flaw to spoof filenames and trick users into executing malicious payloads under the guise of harmless files, potentially leading to remote code execution.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2014-125119", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-07-25T17:40:43.475752Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-25T17:40:59.878Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "Parsing Logic" ], "product": "WinRAR", "vendor": "RARLab", "versions": [ { "lessThan": "3.91", "status": "affected", "version": "3.80", "versionType": "semver" }, { "lessThan": "5.00", "status": "affected", "version": "4.11", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "chr1x" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A filename spoofing vulnerability exists in WinRAR when opening specially crafted ZIP archives. The issue arises due to inconsistencies between the Central Directory and Local File Header entries in ZIP files. When viewed in WinRAR, the file name from the Central Directory is displayed to the user, while the file from the Local File Header is extracted and executed. An attacker can leverage this flaw to spoof filenames and trick users into executing malicious payloads under the guise of harmless files, potentially leading to remote code execution." } ], "value": "A filename spoofing vulnerability exists in WinRAR when opening specially crafted ZIP archives. The issue arises due to inconsistencies between the Central Directory and Local File Header entries in ZIP files. When viewed in WinRAR, the file name from the Central Directory is displayed to the user, while the file from the Local File Header is extracted and executed. An attacker can leverage this flaw to spoof filenames and trick users into executing malicious payloads under the guise of harmless files, potentially leading to remote code execution." } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "LOCAL", "baseScore": 8.4, "baseSeverity": "HIGH", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "ACTIVE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-434", "description": "CWE-434 Unrestricted Upload of File with Dangerous Type", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-25T15:59:39.205Z", "orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10", "shortName": "VulnCheck" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.rarlab.com/vuln_zip_spoofing_4.20.html" }, { "tags": [ "technical-description", "exploit" ], "url": "https://an7isec.blogspot.com/2014/03/winrar-file-extension-spoofing-0day.html" }, { "tags": [ "exploit" ], "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/fileformat/winrar_name_spoofing.rb" }, { "tags": [ "technical-description" ], "url": "https://web.archive.org/web/20141111142204/https://www.intelcrawler.com/report_2603.pdf" }, { "tags": [ "technical-description", "media-coverage" ], "url": "https://web.archive.org/web/20140625054244/http://intelcrawler.com/news-15" }, { "tags": [ "third-party-advisory" ], "url": "https://www.vulncheck.com/advisories/winrar-filename-spoofing-rce" } ], "source": { "discovery": "UNKNOWN" }, "tags": [ "x_known-exploited-vulnerability" ], "title": "WinRAR \u003c 5.00 Filename Spoofing RCE", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10", "assignerShortName": "VulnCheck", "cveId": "CVE-2014-125119", "datePublished": "2025-07-25T15:59:39.205Z", "dateReserved": "2025-07-24T20:58:56.840Z", "dateUpdated": "2025-07-25T17:40:59.878Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2015-5663 (GCVE-0-2015-5663)
Vulnerability from cvelistv5
Published
2015-12-30 02:00
Modified
2024-08-06 06:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The file-execution functionality in WinRAR before 5.30 beta 5 allows local users to gain privileges via a Trojan horse file with a name similar to an extensionless filename that was selected by the user.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T06:59:03.484Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "79666", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/79666" }, { "name": "JVN#64636058", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN64636058/index.html" }, { "name": "1034881", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1034881" }, { "name": "JVNDB-2015-000199", "tags": [ "third-party-advisory", "x_refsource_JVNDB", "x_transferred" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000199" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-12-17T00:00:00", "descriptions": [ { "lang": "en", "value": "The file-execution functionality in WinRAR before 5.30 beta 5 allows local users to gain privileges via a Trojan horse file with a name similar to an extensionless filename that was selected by the user." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-02T20:57:01", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "name": "79666", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/79666" }, { "name": "JVN#64636058", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "http://jvn.jp/en/jp/JVN64636058/index.html" }, { "name": "1034881", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1034881" }, { "name": "JVNDB-2015-000199", "tags": [ "third-party-advisory", "x_refsource_JVNDB" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000199" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2015-5663", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The file-execution functionality in WinRAR before 5.30 beta 5 allows local users to gain privileges via a Trojan horse file with a name similar to an extensionless filename that was selected by the user." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "79666", "refsource": "BID", "url": "http://www.securityfocus.com/bid/79666" }, { "name": "JVN#64636058", "refsource": "JVN", "url": "http://jvn.jp/en/jp/JVN64636058/index.html" }, { "name": "1034881", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1034881" }, { "name": "JVNDB-2015-000199", "refsource": "JVNDB", "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000199" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2015-5663", "datePublished": "2015-12-30T02:00:00", "dateReserved": "2015-07-24T00:00:00", "dateUpdated": "2024-08-06T06:59:03.484Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-36052 (GCVE-0-2024-36052)
Vulnerability from cvelistv5
Published
2024-05-21 16:37
Modified
2025-02-13 15:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
RARLAB WinRAR before 7.00, on Windows, allows attackers to spoof the screen output via ANSI escape sequences, a different issue than CVE-2024-33899.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T03:30:12.233Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.rarlab.com/rarnew.htm" }, { "tags": [ "x_transferred" ], "url": "https://sdushantha.medium.com/ansi-escape-injection-vulnerability-in-winrar-a2cbfac4b983" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:rarlab:winrar:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "winrar", "vendor": "rarlab", "versions": [ { "lessThan": "7.00", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-36052", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-20T14:21:39.558515Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-150", "description": "CWE-150 Improper Neutralization of Escape, Meta, or Control Sequences", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-20T14:34:17.037Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "RARLAB WinRAR before 7.00, on Windows, allows attackers to spoof the screen output via ANSI escape sequences, a different issue than CVE-2024-33899." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-21T16:37:49.977Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://www.rarlab.com/rarnew.htm" }, { "url": "https://sdushantha.medium.com/ansi-escape-injection-vulnerability-in-winrar-a2cbfac4b983" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2024-36052", "datePublished": "2024-05-21T16:37:49.665Z", "dateReserved": "2024-05-18T00:00:00.000Z", "dateUpdated": "2025-02-13T15:59:12.307Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-7144 (GCVE-0-2008-7144)
Vulnerability from cvelistv5
Published
2009-09-01 16:00
Modified
2024-08-07 11:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple unspecified vulnerabilities in RARLAB WinRAR before 3.71 have unknown impact and attack vectors related to crafted (1) ACE, (2) ARJ, (3) BZ2, (4) CAB, (5) GZ, (6) LHA, (7) RAR, (8) TAR, or (9) ZIP files, as demonstrated by the OUSPG PROTOS GENOME test suite for Archive Formats.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T11:56:14.177Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "29407", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29407" }, { "name": "43439", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/43439" }, { "name": "ADV-2008-0916", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0916/references" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.cert.fi/haavoittuvuudet/joint-advisory-archive-formats.html" }, { "name": "winrar-archives-code-execution(41251)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41251" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.ee.oulu.fi/research/ouspg/protos/testing/c10/archive/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-03-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in RARLAB WinRAR before 3.71 have unknown impact and attack vectors related to crafted (1) ACE, (2) ARJ, (3) BZ2, (4) CAB, (5) GZ, (6) LHA, (7) RAR, (8) TAR, or (9) ZIP files, as demonstrated by the OUSPG PROTOS GENOME test suite for Archive Formats." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "29407", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29407" }, { "name": "43439", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/43439" }, { "name": "ADV-2008-0916", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0916/references" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.cert.fi/haavoittuvuudet/joint-advisory-archive-formats.html" }, { "name": "winrar-archives-code-execution(41251)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41251" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.ee.oulu.fi/research/ouspg/protos/testing/c10/archive/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-7144", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple unspecified vulnerabilities in RARLAB WinRAR before 3.71 have unknown impact and attack vectors related to crafted (1) ACE, (2) ARJ, (3) BZ2, (4) CAB, (5) GZ, (6) LHA, (7) RAR, (8) TAR, or (9) ZIP files, as demonstrated by the OUSPG PROTOS GENOME test suite for Archive Formats." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "29407", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29407" }, { "name": "43439", "refsource": "OSVDB", "url": "http://osvdb.org/43439" }, { "name": "ADV-2008-0916", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0916/references" }, { "name": "http://www.cert.fi/haavoittuvuudet/joint-advisory-archive-formats.html", "refsource": "MISC", "url": "http://www.cert.fi/haavoittuvuudet/joint-advisory-archive-formats.html" }, { "name": "winrar-archives-code-execution(41251)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41251" }, { "name": "http://www.ee.oulu.fi/research/ouspg/protos/testing/c10/archive/", "refsource": "MISC", "url": "http://www.ee.oulu.fi/research/ouspg/protos/testing/c10/archive/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-7144", "datePublished": "2009-09-01T16:00:00", "dateReserved": "2009-09-01T00:00:00", "dateUpdated": "2024-08-07T11:56:14.177Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-40477 (GCVE-0-2023-40477)
Vulnerability from cvelistv5
Published
2024-05-03 02:11
Modified
2024-08-02 18:31
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-129 - Improper Validation of Array Index
Summary
RARLAB WinRAR Recovery Volume Improper Validation of Array Index Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the processing of recovery volumes. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-21233.
References
► | URL | Tags |
---|---|---|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:rarlab:winrar:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "winrar", "vendor": "rarlab", "versions": [ { "status": "affected", "version": "6.21" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-40477", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-18T13:35:58.103184Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-18T13:47:35.415Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T18:31:53.902Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ZDI-23-1152", "tags": [ "x_research-advisory", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1152/" }, { "name": "vendor-provided URL", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.win-rar.com/singlenewsview.html?\u0026L=0\u0026tx_ttnews%5Btt_news%5D=232\u0026cHash=c5bf79590657e32554c6683296a8e8aa" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "WinRAR", "vendor": "RARLAB", "versions": [ { "status": "affected", "version": "6.21" } ] } ], "dateAssigned": "2023-08-14T16:14:46.683-05:00", "datePublic": "2023-08-17T14:42:16.400-05:00", "descriptions": [ { "lang": "en", "value": "RARLAB WinRAR Recovery Volume Improper Validation of Array Index Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the processing of recovery volumes. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-21233." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-129", "description": "CWE-129: Improper Validation of Array Index", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-03T02:11:12.905Z", "orgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "shortName": "zdi" }, "references": [ { "name": "ZDI-23-1152", "tags": [ "x_research-advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1152/" }, { "name": "vendor-provided URL", "tags": [ "vendor-advisory" ], "url": "https://www.win-rar.com/singlenewsview.html?\u0026L=0\u0026tx_ttnews%5Btt_news%5D=232\u0026cHash=c5bf79590657e32554c6683296a8e8aa" } ], "source": { "lang": "en", "value": "goodbyeselene" }, "title": "RARLAB WinRAR Recovery Volume Improper Validation of Array Index Remote Code Execution Vulnerability" } }, "cveMetadata": { "assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "assignerShortName": "zdi", "cveId": "CVE-2023-40477", "datePublished": "2024-05-03T02:11:12.905Z", "dateReserved": "2023-08-14T21:06:28.913Z", "dateUpdated": "2024-08-02T18:31:53.902Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-33899 (GCVE-0-2024-33899)
Vulnerability from cvelistv5
Published
2024-04-28 00:00
Modified
2024-08-02 02:42
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
RARLAB WinRAR before 7.00, on Linux and UNIX platforms, allows attackers to spoof the screen output, or cause a denial of service, via ANSI escape sequences.
References
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:rarlab:winrar:6.24:*:*:*:*:*:*:*" ], "defaultStatus": "affected", "product": "winrar", "vendor": "rarlab", "versions": [ { "lessThanOrEqual": "6.24", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:rarlab:unrar:6.24:*:*:*:*:*:*:*" ], "defaultStatus": "affected", "product": "unrar", "vendor": "rarlab", "versions": [ { "lessThanOrEqual": "6.24", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-33899", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-22T20:30:00.328765Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-150", "description": "CWE-150 Improper Neutralization of Escape, Meta, or Control Sequences", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:44:21.869Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:42:59.602Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.rarlab.com/rarnew.htm" }, { "tags": [ "x_transferred" ], "url": "https://sdushantha.medium.com/ansi-escape-injection-vulnerability-in-winrar-a2cbfac4b983" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "RARLAB WinRAR before 7.00, on Linux and UNIX platforms, allows attackers to spoof the screen output, or cause a denial of service, via ANSI escape sequences." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-21T16:38:19.835648", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://www.rarlab.com/rarnew.htm" }, { "url": "https://sdushantha.medium.com/ansi-escape-injection-vulnerability-in-winrar-a2cbfac4b983" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2024-33899", "datePublished": "2024-04-28T00:00:00", "dateReserved": "2024-04-28T00:00:00", "dateUpdated": "2024-08-02T02:42:59.602Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-6218 (GCVE-0-2025-6218)
Vulnerability from cvelistv5
Published
2025-06-21 00:09
Modified
2025-06-23 20:15
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Summary
RARLAB WinRAR Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the handling of file paths within archive files. A crafted file path can cause the process to traverse to unintended directories. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-27198.
References
► | URL | Tags |
---|---|---|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-6218", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-06-23T20:14:17.721269Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-23T20:15:40.017Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "WinRAR", "vendor": "RARLAB", "versions": [ { "status": "affected", "version": "7.11 (64-bit)" } ] } ], "dateAssigned": "2025-06-17T21:51:12.783Z", "datePublic": "2025-06-19T15:11:28.964Z", "descriptions": [ { "lang": "en", "value": "RARLAB WinRAR Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of file paths within archive files. A crafted file path can cause the process to traverse to unintended directories. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-27198." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-21T00:09:02.884Z", "orgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "shortName": "zdi" }, "references": [ { "name": "ZDI-25-409", "tags": [ "x_research-advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-409/" }, { "name": "vendor-provided URL", "tags": [ "vendor-advisory" ], "url": "https://www.win-rar.com/singlenewsview.html?\u0026tx_ttnews%5Btt_news%5D=276\u0026cHash=388885bd3908a40726f535c026f94eb6" } ], "source": { "lang": "en", "value": "whs3-detonator" }, "title": "RARLAB WinRAR Directory Traversal Remote Code Execution Vulnerability" } }, "cveMetadata": { "assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "assignerShortName": "zdi", "cveId": "CVE-2025-6218", "datePublished": "2025-06-21T00:09:02.884Z", "dateReserved": "2025-06-17T21:51:12.763Z", "dateUpdated": "2025-06-23T20:15:40.017Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2005-3262 (GCVE-0-2005-3262)
Vulnerability from cvelistv5
Published
2005-10-20 04:00
Modified
2024-08-07 23:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Format string vulnerability in RARLAB WinRAR 2.90 through 3.50 allows remote attackers to execute arbitrary code via format string specifiers in a UUE/XXE file, which are not properly handled when WinRAR displays diagnostic errors related to an invalid filename.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T23:01:59.422Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "15062", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/15062" }, { "name": "16973", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/16973/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.rarlabs.com/rarnew.htm" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2005-53/advisory/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-10-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Format string vulnerability in RARLAB WinRAR 2.90 through 3.50 allows remote attackers to execute arbitrary code via format string specifiers in a UUE/XXE file, which are not properly handled when WinRAR displays diagnostic errors related to an invalid filename." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-11-04T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "15062", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/15062" }, { "name": "16973", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/16973/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.rarlabs.com/rarnew.htm" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2005-53/advisory/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-3262", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Format string vulnerability in RARLAB WinRAR 2.90 through 3.50 allows remote attackers to execute arbitrary code via format string specifiers in a UUE/XXE file, which are not properly handled when WinRAR displays diagnostic errors related to an invalid filename." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "15062", "refsource": "BID", "url": "http://www.securityfocus.com/bid/15062" }, { "name": "16973", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/16973/" }, { "name": "http://www.rarlabs.com/rarnew.htm", "refsource": "CONFIRM", "url": "http://www.rarlabs.com/rarnew.htm" }, { "name": "http://secunia.com/secunia_research/2005-53/advisory/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2005-53/advisory/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-3262", "datePublished": "2005-10-20T04:00:00", "dateReserved": "2005-10-20T00:00:00", "dateUpdated": "2024-08-07T23:01:59.422Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2005-3263 (GCVE-0-2005-3263)
Vulnerability from cvelistv5
Published
2005-10-20 04:00
Modified
2024-08-07 23:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Stack-based buffer overflow in UNACEV2.DLL for RARLAB WinRAR 2.90 through 3.50 allows remote attackers to execute arbitrary code via an ACE archive containing a file with a long name.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T23:01:59.191Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "15062", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/15062" }, { "name": "20051011 Secunia Research: WinRAR Format String and Buffer Overflow Vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0266.html" }, { "name": "19915", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/19915" }, { "name": "16973", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/16973/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.rarlabs.com/rarnew.htm" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2005-53/advisory/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-10-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in UNACEV2.DLL for RARLAB WinRAR 2.90 through 3.50 allows remote attackers to execute arbitrary code via an ACE archive containing a file with a long name." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-11-04T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "15062", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/15062" }, { "name": "20051011 Secunia Research: WinRAR Format String and Buffer Overflow Vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0266.html" }, { "name": "19915", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/19915" }, { "name": "16973", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/16973/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.rarlabs.com/rarnew.htm" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2005-53/advisory/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-3263", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in UNACEV2.DLL for RARLAB WinRAR 2.90 through 3.50 allows remote attackers to execute arbitrary code via an ACE archive containing a file with a long name." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "15062", "refsource": "BID", "url": "http://www.securityfocus.com/bid/15062" }, { "name": "20051011 Secunia Research: WinRAR Format String and Buffer Overflow Vulnerabilities", "refsource": "FULLDISC", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0266.html" }, { "name": "19915", "refsource": "OSVDB", "url": "http://www.osvdb.org/19915" }, { "name": "16973", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/16973/" }, { "name": "http://www.rarlabs.com/rarnew.htm", "refsource": "CONFIRM", "url": "http://www.rarlabs.com/rarnew.htm" }, { "name": "http://secunia.com/secunia_research/2005-53/advisory/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2005-53/advisory/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-3263", "datePublished": "2005-10-20T04:00:00", "dateReserved": "2005-10-20T00:00:00", "dateUpdated": "2024-08-07T23:01:59.191Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2004-0235 (GCVE-0-2004-0235)
Vulnerability from cvelistv5
Published
2004-05-05 04:00
Modified
2024-08-08 00:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple directory traversal vulnerabilities in LHA 1.14 allow remote attackers or local users to create arbitrary files via an LHA archive containing filenames with (1) .. sequences or (2) absolute pathnames with double leading slashes ("//absolute/path").
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:10:03.724Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "CLA-2004:840", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000840" }, { "name": "FEDORA-2004-119", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://www.redhat.com/archives/fedora-announce-list/2004-May/msg00005.html" }, { "name": "10243", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/10243" }, { "name": "20040501 LHa buffer overflows and directory traversal problems", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020776.html" }, { "name": "lha-directory-traversal(16013)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16013" }, { "name": "RHSA-2004:179", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-179.html" }, { "name": "FLSA:1833", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://bugzilla.fedora.us/show_bug.cgi?id=1833" }, { "name": "DSA-515", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2004/dsa-515" }, { "name": "20040510 [Ulf Harnhammar]: LHA Advisory + Patch", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=108422737918885\u0026w=2" }, { "name": "GLSA-200405-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200405-02.xml" }, { "name": "RHSA-2004:178", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-178.html" }, { "name": "oval:org.mitre.oval:def:978", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A978" }, { "name": "oval:org.mitre.oval:def:10409", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10409" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-04-30T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple directory traversal vulnerabilities in LHA 1.14 allow remote attackers or local users to create arbitrary files via an LHA archive containing filenames with (1) .. sequences or (2) absolute pathnames with double leading slashes (\"//absolute/path\")." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "CLA-2004:840", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000840" }, { "name": "FEDORA-2004-119", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://www.redhat.com/archives/fedora-announce-list/2004-May/msg00005.html" }, { "name": "10243", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/10243" }, { "name": "20040501 LHa buffer overflows and directory traversal problems", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020776.html" }, { "name": "lha-directory-traversal(16013)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16013" }, { "name": "RHSA-2004:179", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-179.html" }, { "name": "FLSA:1833", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://bugzilla.fedora.us/show_bug.cgi?id=1833" }, { "name": "DSA-515", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2004/dsa-515" }, { "name": "20040510 [Ulf Harnhammar]: LHA Advisory + Patch", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=108422737918885\u0026w=2" }, { "name": "GLSA-200405-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200405-02.xml" }, { "name": "RHSA-2004:178", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-178.html" }, { "name": "oval:org.mitre.oval:def:978", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A978" }, { "name": "oval:org.mitre.oval:def:10409", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10409" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0235", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple directory traversal vulnerabilities in LHA 1.14 allow remote attackers or local users to create arbitrary files via an LHA archive containing filenames with (1) .. sequences or (2) absolute pathnames with double leading slashes (\"//absolute/path\")." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "CLA-2004:840", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000840" }, { "name": "FEDORA-2004-119", "refsource": "FEDORA", "url": "http://www.redhat.com/archives/fedora-announce-list/2004-May/msg00005.html" }, { "name": "10243", "refsource": "BID", "url": "http://www.securityfocus.com/bid/10243" }, { "name": "20040501 LHa buffer overflows and directory traversal problems", "refsource": "FULLDISC", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020776.html" }, { "name": "lha-directory-traversal(16013)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16013" }, { "name": "RHSA-2004:179", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-179.html" }, { "name": "FLSA:1833", "refsource": "FEDORA", "url": "https://bugzilla.fedora.us/show_bug.cgi?id=1833" }, { "name": "DSA-515", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2004/dsa-515" }, { "name": "20040510 [Ulf Harnhammar]: LHA Advisory + Patch", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=108422737918885\u0026w=2" }, { "name": "GLSA-200405-02", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200405-02.xml" }, { "name": "RHSA-2004:178", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-178.html" }, { "name": "oval:org.mitre.oval:def:978", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A978" }, { "name": "oval:org.mitre.oval:def:10409", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10409" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0235", "datePublished": "2004-05-05T04:00:00", "dateReserved": "2004-03-17T00:00:00", "dateUpdated": "2024-08-08T00:10:03.724Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2005-4620 (GCVE-0-2005-4620)
Vulnerability from cvelistv5
Published
2006-01-06 11:00
Modified
2024-08-07 23:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Buffer overflow in WinRAR 3.50 and earlier allows local users to execute arbitrary code via a long command-line argument. NOTE: because this program executes with the privileges of the invoking user, and because remote programs do not normally have the ability to specify a command-line argument for this program, there may not be a typical attack vector for the issue that crosses privilege boundaries. Therefore this may not be a vulnerability.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T23:53:27.892Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20060103 Winrar 3.30 Local Buffer Overflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/420679/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.rarlab.com/rarnew.htm" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.securityfocus.com/data/vulnerabilities/exploits/0xletzdance.c" }, { "name": "15123", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/15123" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-10-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in WinRAR 3.50 and earlier allows local users to execute arbitrary code via a long command-line argument. NOTE: because this program executes with the privileges of the invoking user, and because remote programs do not normally have the ability to specify a command-line argument for this program, there may not be a typical attack vector for the issue that crosses privilege boundaries. Therefore this may not be a vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-19T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20060103 Winrar 3.30 Local Buffer Overflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/420679/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.rarlab.com/rarnew.htm" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.securityfocus.com/data/vulnerabilities/exploits/0xletzdance.c" }, { "name": "15123", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/15123" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-4620", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in WinRAR 3.50 and earlier allows local users to execute arbitrary code via a long command-line argument. NOTE: because this program executes with the privileges of the invoking user, and because remote programs do not normally have the ability to specify a command-line argument for this program, there may not be a typical attack vector for the issue that crosses privilege boundaries. Therefore this may not be a vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20060103 Winrar 3.30 Local Buffer Overflow", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/420679/100/0/threaded" }, { "name": "http://www.rarlab.com/rarnew.htm", "refsource": "MISC", "url": "http://www.rarlab.com/rarnew.htm" }, { "name": "http://www.securityfocus.com/data/vulnerabilities/exploits/0xletzdance.c", "refsource": "MISC", "url": "http://www.securityfocus.com/data/vulnerabilities/exploits/0xletzdance.c" }, { "name": "15123", "refsource": "BID", "url": "http://www.securityfocus.com/bid/15123" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-4620", "datePublished": "2006-01-06T11:00:00", "dateReserved": "2006-01-06T00:00:00", "dateUpdated": "2024-08-07T23:53:27.892Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-20250 (GCVE-0-2018-20250)
Vulnerability from cvelistv5
Published
2019-02-05 20:00
Modified
2025-07-30 01:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-36 - Absolute Path Traversal
Summary
In WinRAR versions prior to and including 5.61, There is path traversal vulnerability when crafting the filename field of the ACE format (in UNACEV2.dll). When the filename field is manipulated with specific patterns, the destination (extraction) folder is ignored, thus treating the filename as an absolute path.
References
► | URL | Tags | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Check Point Software Technologies Ltd. | WinRAR |
Version: All versions prior and including 5.61 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T11:58:19.126Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/blau72/CVE-2018-20250-WinRAR-ACE" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://research.checkpoint.com/extracting-code-execution-from-winrar/" }, { "name": "46552", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/46552/" }, { "name": "106948", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106948" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.win-rar.com/whatsnew.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/152618/RARLAB-WinRAR-ACE-Format-Input-Validation-Remote-Code-Execution.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.rapid7.com/db/modules/exploit/windows/fileformat/winrar_ace" }, { "name": "46756", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/46756/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2018-20250", "options": [ { "Exploitation": "active" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-07T13:40:28.345239Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2022-02-15", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2018-20250" }, "type": "kev" } } ], "providerMetadata": { "dateUpdated": "2025-07-30T01:46:08.642Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "timeline": [ { "lang": "en", "time": "2022-02-15T00:00:00+00:00", "value": "CVE-2018-20250 added to CISA KEV" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "WinRAR", "vendor": "Check Point Software Technologies Ltd.", "versions": [ { "status": "affected", "version": "All versions prior and including 5.61" } ] } ], "datePublic": "2019-02-05T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "In WinRAR versions prior to and including 5.61, There is path traversal vulnerability when crafting the filename field of the ACE format (in UNACEV2.dll). When the filename field is manipulated with specific patterns, the destination (extraction) folder is ignored, thus treating the filename as an absolute path." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-36", "description": "CWE-36: Absolute Path Traversal", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-25T18:06:08.000Z", "orgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "shortName": "checkpoint" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/blau72/CVE-2018-20250-WinRAR-ACE" }, { "tags": [ "x_refsource_MISC" ], "url": "https://research.checkpoint.com/extracting-code-execution-from-winrar/" }, { "name": "46552", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/46552/" }, { "name": "106948", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106948" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.win-rar.com/whatsnew.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/152618/RARLAB-WinRAR-ACE-Format-Input-Validation-Remote-Code-Execution.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.rapid7.com/db/modules/exploit/windows/fileformat/winrar_ace" }, { "name": "46756", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/46756/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@checkpoint.com", "DATE_PUBLIC": "2019-02-05T00:00:00", "ID": "CVE-2018-20250", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "WinRAR", "version": { "version_data": [ { "version_value": "All versions prior and including 5.61" } ] } } ] }, "vendor_name": "Check Point Software Technologies Ltd." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In WinRAR versions prior to and including 5.61, There is path traversal vulnerability when crafting the filename field of the ACE format (in UNACEV2.dll). When the filename field is manipulated with specific patterns, the destination (extraction) folder is ignored, thus treating the filename as an absolute path." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-36: Absolute Path Traversal" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/blau72/CVE-2018-20250-WinRAR-ACE", "refsource": "MISC", "url": "https://github.com/blau72/CVE-2018-20250-WinRAR-ACE" }, { "name": "https://research.checkpoint.com/extracting-code-execution-from-winrar/", "refsource": "MISC", "url": "https://research.checkpoint.com/extracting-code-execution-from-winrar/" }, { "name": "46552", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/46552/" }, { "name": "106948", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106948" }, { "name": "https://www.win-rar.com/whatsnew.html", "refsource": "MISC", "url": "https://www.win-rar.com/whatsnew.html" }, { "name": "http://packetstormsecurity.com/files/152618/RARLAB-WinRAR-ACE-Format-Input-Validation-Remote-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/152618/RARLAB-WinRAR-ACE-Format-Input-Validation-Remote-Code-Execution.html" }, { "name": "http://www.rapid7.com/db/modules/exploit/windows/fileformat/winrar_ace", "refsource": "MISC", "url": "http://www.rapid7.com/db/modules/exploit/windows/fileformat/winrar_ace" }, { "name": "46756", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/46756/" } ] } } } }, "cveMetadata": { "assignerOrgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "assignerShortName": "checkpoint", "cveId": "CVE-2018-20250", "datePublished": "2019-02-05T20:00:00.000Z", "dateReserved": "2018-12-19T00:00:00.000Z", "dateUpdated": "2025-07-30T01:46:08.642Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-20251 (GCVE-0-2018-20251)
Vulnerability from cvelistv5
Published
2019-02-05 20:00
Modified
2024-09-16 21:04
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-693 - Protection Mechanism Failure
Summary
In WinRAR versions prior to and including 5.61, there is path traversal vulnerability when crafting the filename field of the ACE format. The UNACE module (UNACEV2.dll) creates files and folders as written in the filename field even when WinRAR validator noticed the traversal attempt and requestd to abort the extraction process. the operation is cancelled only after the folders and files were created but prior to them being written, therefore allowing the attacker to create empty files and folders everywhere in the file system.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Check Point Software Technologies Ltd. | WinRAR |
Version: All versions prior and including 5.61 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T11:58:19.020Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://research.checkpoint.com/extracting-code-execution-from-winrar/" }, { "name": "106948", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106948" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.win-rar.com/whatsnew.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "WinRAR", "vendor": "Check Point Software Technologies Ltd.", "versions": [ { "status": "affected", "version": "All versions prior and including 5.61" } ] } ], "datePublic": "2019-02-05T00:00:00", "descriptions": [ { "lang": "en", "value": "In WinRAR versions prior to and including 5.61, there is path traversal vulnerability when crafting the filename field of the ACE format. The UNACE module (UNACEV2.dll) creates files and folders as written in the filename field even when WinRAR validator noticed the traversal attempt and requestd to abort the extraction process. the operation is cancelled only after the folders and files were created but prior to them being written, therefore allowing the attacker to create empty files and folders everywhere in the file system." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-693", "description": "CWE-693: Protection Mechanism Failure", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-03-14T17:57:01", "orgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "shortName": "checkpoint" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://research.checkpoint.com/extracting-code-execution-from-winrar/" }, { "name": "106948", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106948" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.win-rar.com/whatsnew.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@checkpoint.com", "DATE_PUBLIC": "2019-02-05T00:00:00", "ID": "CVE-2018-20251", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "WinRAR", "version": { "version_data": [ { "version_value": "All versions prior and including 5.61" } ] } } ] }, "vendor_name": "Check Point Software Technologies Ltd." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In WinRAR versions prior to and including 5.61, there is path traversal vulnerability when crafting the filename field of the ACE format. The UNACE module (UNACEV2.dll) creates files and folders as written in the filename field even when WinRAR validator noticed the traversal attempt and requestd to abort the extraction process. the operation is cancelled only after the folders and files were created but prior to them being written, therefore allowing the attacker to create empty files and folders everywhere in the file system." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-693: Protection Mechanism Failure" } ] } ] }, "references": { "reference_data": [ { "name": "https://research.checkpoint.com/extracting-code-execution-from-winrar/", "refsource": "MISC", "url": "https://research.checkpoint.com/extracting-code-execution-from-winrar/" }, { "name": "106948", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106948" }, { "name": "https://www.win-rar.com/whatsnew.html", "refsource": "MISC", "url": "https://www.win-rar.com/whatsnew.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "assignerShortName": "checkpoint", "cveId": "CVE-2018-20251", "datePublished": "2019-02-05T20:00:00Z", "dateReserved": "2018-12-19T00:00:00", "dateUpdated": "2024-09-16T21:04:19.182Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-38831 (GCVE-0-2023-38831)
Vulnerability from cvelistv5
Published
2023-08-23 00:00
Modified
2025-07-30 01:37
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
RARLAB WinRAR before 6.23 allows attackers to execute arbitrary code when a user attempts to view a benign file within a ZIP archive. The issue occurs because a ZIP archive may include a benign file (such as an ordinary .JPG file) and also a folder that has the same name as the benign file, and the contents of the folder (which may include executable content) are processed during an attempt to access only the benign file. This was exploited in the wild in April through October 2023.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:rarlab:winrar:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "winrar", "vendor": "rarlab", "versions": [ { "lessThan": "6.23", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-38831", "options": [ { "Exploitation": "active" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-04-29T18:48:48.346127Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2023-08-24", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-38831" }, "type": "kev" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-351", "description": "CWE-351 Insufficient Type Distinction", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-30T01:37:19.318Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "timeline": [ { "lang": "en", "time": "2023-08-24T00:00:00+00:00", "value": "CVE-2023-38831 added to CISA KEV" } ], "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T17:54:38.543Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.group-ib.com/blog/cve-2023-38831-winrar-zero-day/" }, { "tags": [ "x_transferred" ], "url": "https://www.bleepingcomputer.com/news/security/winrar-zero-day-exploited-since-april-to-hack-trading-accounts/" }, { "tags": [ "x_transferred" ], "url": "https://news.ycombinator.com/item?id=37236100" }, { "tags": [ "x_transferred" ], "url": "http://packetstormsecurity.com/files/174573/WinRAR-Remote-Code-Execution.html" }, { "tags": [ "x_transferred" ], "url": "https://blog.google/threat-analysis-group/government-backed-actors-exploiting-winrar-vulnerability/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "RARLAB WinRAR before 6.23 allows attackers to execute arbitrary code when a user attempts to view a benign file within a ZIP archive. The issue occurs because a ZIP archive may include a benign file (such as an ordinary .JPG file) and also a folder that has the same name as the benign file, and the contents of the folder (which may include executable content) are processed during an attempt to access only the benign file. This was exploited in the wild in April through October 2023." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-23T00:10:57.118Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://www.group-ib.com/blog/cve-2023-38831-winrar-zero-day/" }, { "url": "https://www.bleepingcomputer.com/news/security/winrar-zero-day-exploited-since-april-to-hack-trading-accounts/" }, { "url": "https://news.ycombinator.com/item?id=37236100" }, { "url": "http://packetstormsecurity.com/files/174573/WinRAR-Remote-Code-Execution.html" }, { "url": "https://blog.google/threat-analysis-group/government-backed-actors-exploiting-winrar-vulnerability/" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-38831", "datePublished": "2023-08-23T00:00:00.000Z", "dateReserved": "2023-07-25T00:00:00.000Z", "dateUpdated": "2025-07-30T01:37:19.318Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2004-1254 (GCVE-0-2004-1254)
Vulnerability from cvelistv5
Published
2004-12-22 05:00
Modified
2024-08-08 00:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
WinRAR 3.40, and possibly earlier versions, allows remote attackers to execute arbitrary code via a ZIP file containing a file with a long filename, possibly causing an integer overflow that leads to a buffer overflow.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:46:12.321Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.frsirt.com/exploits/20041217.Winrar.c.php" }, { "name": "winrar-zip-file-bo(18569)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18569" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-12-17T00:00:00", "descriptions": [ { "lang": "en", "value": "WinRAR 3.40, and possibly earlier versions, allows remote attackers to execute arbitrary code via a ZIP file containing a file with a long filename, possibly causing an integer overflow that leads to a buffer overflow." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.frsirt.com/exploits/20041217.Winrar.c.php" }, { "name": "winrar-zip-file-bo(18569)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18569" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-1254", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "WinRAR 3.40, and possibly earlier versions, allows remote attackers to execute arbitrary code via a ZIP file containing a file with a long filename, possibly causing an integer overflow that leads to a buffer overflow." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.frsirt.com/exploits/20041217.Winrar.c.php", "refsource": "MISC", "url": "http://www.frsirt.com/exploits/20041217.Winrar.c.php" }, { "name": "winrar-zip-file-bo(18569)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18569" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-1254", "datePublished": "2004-12-22T05:00:00", "dateReserved": "2004-12-20T00:00:00", "dateUpdated": "2024-08-08T00:46:12.321Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-8088 (GCVE-0-2025-8088)
Vulnerability from cvelistv5
Published
2025-08-08 11:11
Modified
2025-08-15 15:49
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-35 - Path traversal
Summary
A path traversal vulnerability affecting the Windows version of WinRAR allows the attackers to execute arbitrary code by crafting malicious archive files. This vulnerability was exploited in the wild and was discovered by Anton Cherepanov, Peter Košinár, and Peter Strýček
from ESET.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
win.rar GmbH | WinRAR |
Version: 0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-8088", "options": [ { "Exploitation": "active" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-08-12T03:55:17.302460Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2025-08-12", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-8088" }, "type": "kev" } } ], "providerMetadata": { "dateUpdated": "2025-08-12T22:20:23.816Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "technical-description" ], "url": "https://www.welivesecurity.com/en/eset-research/update-winrar-tools-now-romcom-and-others-exploiting-zero-day-vulnerability/#the-discovery-of-cve-2025-8088" } ], "timeline": [ { "lang": "en", "time": "2025-08-12T00:00:00+00:00", "value": "CVE-2025-8088 added to CISA KEV" } ], "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2025-08-15T15:49:47.629Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "https://www.vicarius.io/vsociety/posts/cve-2025-8088-detect-winrar-zero-day" }, { "url": "https://www.vicarius.io/vsociety/posts/cve-2025-8088-mitigate-winrar-zero-day-using-srp-and-ifeo" } ], "title": "CVE Program Container", "x_generator": { "engine": "ADPogram 0.0.1" } } ], "cna": { "affected": [ { "defaultStatus": "unknown", "platforms": [ "Windows" ], "product": "WinRAR", "vendor": "win.rar GmbH", "versions": [ { "lessThanOrEqual": "7.12", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A path traversal vulnerability affecting the Windows version of WinRAR allows the attackers to execute arbitrary code by crafting malicious archive files. This vulnerability was exploited in the wild and was discovered by\u0026nbsp;Anton Cherepanov, Peter Ko\u0161in\u00e1r, and Peter Str\u00fd\u010dek\n from ESET." } ], "value": "A path traversal vulnerability affecting the Windows version of WinRAR allows the attackers to execute arbitrary code by crafting malicious archive files. This vulnerability was exploited in the wild and was discovered by\u00a0Anton Cherepanov, Peter Ko\u0161in\u00e1r, and Peter Str\u00fd\u010dek\n from ESET." } ], "impacts": [ { "capecId": "CAPEC-549", "descriptions": [ { "lang": "en", "value": "CAPEC-549 Local Execution of Code" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "LOCAL", "baseScore": 8.4, "baseSeverity": "HIGH", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "ACTIVE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-35", "description": "CWE-35 Path traversal", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-08T11:11:41.842Z", "orgId": "4a9b9929-2450-4021-b7b9-469a0255b215", "shortName": "ESET" }, "references": [ { "url": "https://www.win-rar.com/singlenewsview.html?\u0026L=0\u0026tx_ttnews%5Btt_news%5D=283\u0026cHash=a64b4a8f662d3639dec8d65f47bc93c5" } ], "source": { "discovery": "UNKNOWN" }, "title": "Path traversal vulnerability in WinRAR", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "4a9b9929-2450-4021-b7b9-469a0255b215", "assignerShortName": "ESET", "cveId": "CVE-2025-8088", "datePublished": "2025-08-08T11:11:41.842Z", "dateReserved": "2025-07-23T15:35:47.170Z", "dateUpdated": "2025-08-15T15:49:47.629Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
jvndb-2015-000199
Vulnerability from jvndb
Published
2015-12-17 15:19
Modified
2016-01-07 15:36
Severity ?
Summary
WinRAR may insecurely load executable files
Details
WinRAR contains a function where user specified files on the local disk can be executed. When this file does not have a file extension, a file of the same name with a file extension contained in the same folder may be executed by WinRAR instead of the user specified file.
WinRAR also contains a function where registry settings can be saved and registry settings can be recovered from files. If the folder displayed on screen contains an executable file, such as REGEDIT.BAT, when attempting to save or recover registry settings, REGEDIT.BAT is executed instead of the Windows registry editor (regedit.exe).
References
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2015/JVNDB-2015-000199.html", "dc:date": "2016-01-07T15:36+09:00", "dcterms:issued": "2015-12-17T15:19+09:00", "dcterms:modified": "2016-01-07T15:36+09:00", "description": "WinRAR contains a function where user specified files on the local disk can be executed. When this file does not have a file extension, a file of the same name with a file extension contained in the same folder may be executed by WinRAR instead of the user specified file.\r\n\r\nWinRAR also contains a function where registry settings can be saved and registry settings can be recovered from files. If the folder displayed on screen contains an executable file, such as REGEDIT.BAT, when attempting to save or recover registry settings, REGEDIT.BAT is executed instead of the Windows registry editor (regedit.exe).", "link": "https://jvndb.jvn.jp/en/contents/2015/JVNDB-2015-000199.html", "sec:cpe": { "#text": "cpe:/a:rarlab:winrar", "@product": "WinRAR", "@vendor": "RARLAB", "@version": "2.2" }, "sec:cvss": [ { "@score": "5.1", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "@version": "2.0" }, { "@score": "7.8", "@severity": "High", "@type": "Base", "@vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "@version": "3.0" } ], "sec:identifier": "JVNDB-2015-000199", "sec:references": [ { "#text": "https://jvn.jp/en/jp/JVN64636058/index.html", "@id": "JVN#64636058", "@source": "JVN" }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5663", "@id": "CVE-2015-5663", "@source": "CVE" }, { "#text": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-5663", "@id": "CVE-2015-5663", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-Other", "@title": "No Mapping(CWE-Other)" } ], "title": "WinRAR may insecurely load executable files" }
jvndb-2025-000025
Vulnerability from jvndb
Published
2025-04-03 12:29
Modified
2025-04-03 12:29
Severity ?
Summary
WinRAR vulnerable to the symbolic link based "Mark of the Web" check bypass
Details
WinRAR provided by RARLAB contains a vulnerability that bypasses the "Mark of the Web" (CWE-356) security warning function for files when opening a symbolic link that points to an executable file.
In the initial Windows configuration, only administrators have the privilege to create symbolic links.
Taihei Shimamine of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
► | Type | URL | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2025/JVNDB-2025-000025.html", "dc:date": "2025-04-03T12:29+09:00", "dcterms:issued": "2025-04-03T12:29+09:00", "dcterms:modified": "2025-04-03T12:29+09:00", "description": "WinRAR provided by RARLAB contains a vulnerability that bypasses the \"Mark of the Web\" (CWE-356) security warning function for files when opening a symbolic link that points to an executable file.\r\nIn the initial Windows configuration, only administrators have the privilege to create symbolic links.\r\n\r\nTaihei Shimamine of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2025/JVNDB-2025-000025.html", "sec:cpe": { "#text": "cpe:/a:rarlab:winrar", "@product": "WinRAR", "@vendor": "RARLAB", "@version": "2.2" }, "sec:cvss": { "@score": "6.8", "@severity": "Medium", "@type": "Base", "@vector": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", "@version": "3.0" }, "sec:identifier": "JVNDB-2025-000025", "sec:references": [ { "#text": "https://jvn.jp/en/jp/JVN59547048/index.html", "@id": "JVN#59547048", "@source": "JVN" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2025-31334", "@id": "CVE-2025-31334", "@source": "CVE" }, { "#text": "https://cwe.mitre.org/data/definitions/356.html", "@id": "CWE-356", "@title": "Product UI does not Warn User of Unsafe Actions(CWE-356)" } ], "title": "WinRAR vulnerable to the symbolic link based \"Mark of the Web\" check bypass" }