Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2007-0855

Опубликовано: 08 фев. 2007
Источник: debian
EPSS Низкий

Описание

Stack-based buffer overflow in RARLabs Unrar, as packaged in WinRAR and possibly other products, allows user-assisted remote attackers to execute arbitrary code via a crafted, password-protected archive.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
rarfixed1:3.7b1-1package
rarno-dsasargepackage
rarno-dsaetchpackage
unrar-nonfreefixed1:3.7.3-1package
unrar-nonfreefixed1:3.5.2-0.2sargepackage
unrar-nonfreefixed1:3.5.4-1.1etchpackage

Примечания

  • amavid-new automatically uses "rar -p-" or "unrar -p-",

  • which probably turns this into remote code execution

  • clamav can also call unrar -p-, but AFAICS not in default configuration

  • unrar-free and clamav (which embeds unrar-free code) not affected

EPSS

Процентиль: 88%
0.04344
Низкий

Связанные уязвимости

ubuntu
больше 18 лет назад

Stack-based buffer overflow in RARLabs Unrar, as packaged in WinRAR and possibly other products, allows user-assisted remote attackers to execute arbitrary code via a crafted, password-protected archive.

nvd
больше 18 лет назад

Stack-based buffer overflow in RARLabs Unrar, as packaged in WinRAR and possibly other products, allows user-assisted remote attackers to execute arbitrary code via a crafted, password-protected archive.

github
больше 3 лет назад

Stack-based buffer overflow in RARLabs Unrar, as packaged in WinRAR and possibly other products, allows user-assisted remote attackers to execute arbitrary code via a crafted, password-protected archive.

EPSS

Процентиль: 88%
0.04344
Низкий