Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-40477

Опубликовано: 03 мая 2024
Источник: debian
EPSS Критический

Описание

RARLAB WinRAR Recovery Volume Improper Validation of Array Index Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of recovery volumes. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-21233.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
rarfixed2:6.23-1package
rarfixed2:6.23-1~deb12u1bookwormpackage
rarfixed2:6.23-1~deb11u1bullseyepackage
unrar-nonfreefixed1:6.2.10-1package
unrar-nonfreefixed1:6.2.6-1+deb12u1bookwormpackage
unrar-nonfreefixed1:6.0.3-1+deb11u3bullseyepackage
libclamunrarfixed1.0.3-1package
libclamunrarfixed1.0.3-1~deb12u1bookwormpackage
libclamunrarfixed0.103.10-1~deb11u1bullseyepackage

Примечания

  • https://www.zerodayinitiative.com/advisories/ZDI-23-1152/

  • https://www.win-rar.com/singlenewsview.html?&L=0&tx_ttnews%5Btt_news%5D=232&cHash=c5bf79590657e32554c6683296a8e8aa

  • https://blog.clamav.net/2023/08/clamav-120-feature-version-and-111-102.html

EPSS

Процентиль: 100%
0.92803
Критический

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 2 года назад

RARLAB WinRAR Recovery Volume Improper Validation of Array Index Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of recovery volumes. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-21233.

CVSS3: 7.8
nvd
почти 2 года назад

RARLAB WinRAR Recovery Volume Improper Validation of Array Index Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of recovery volumes. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-21233.

suse-cvrf
около 2 лет назад

Security update for clamav

suse-cvrf
больше 2 лет назад

Security update for clamav

CVSS3: 7.8
github
почти 2 года назад

RARLAB WinRAR Recovery Volume Improper Validation of Array Index Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of recovery volumes. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-21233.

EPSS

Процентиль: 100%
0.92803
Критический