Описание
RARLAB WinRAR before 7.00, on Linux and UNIX platforms, allows attackers to spoof the screen output, or cause a denial of service, via ANSI escape sequences.
Пакеты
Пакет | Статус | Версия исправления | Релиз | Тип |
---|---|---|---|---|
rar | fixed | 2:7.00-1 | package | |
rar | ignored | bookworm | package | |
rar | no-dsa | bullseye | package | |
unrar-nonfree | fixed | 1:7.0.3-1 | package | |
unrar-nonfree | ignored | bookworm | package | |
unrar-nonfree | no-dsa | bullseye | package |
Примечания
https://sdushantha.medium.com/ansi-escape-injection-vulnerability-in-winrar-a2cbfac4b983
EPSS
Связанные уязвимости
RARLAB WinRAR before 7.00, on Linux and UNIX platforms, allows attackers to spoof the screen output, or cause a denial of service, via ANSI escape sequences.
RARLAB WinRAR before 7.00, on Linux and UNIX platforms, allows attackers to spoof the screen output, or cause a denial of service, via ANSI escape sequences.
RARLAB WinRAR before 7.00, on Linux and UNIX platforms, allows attackers to spoof the screen output, or cause a denial of service, via ANSI escape sequences.
Уязвимость компонента ANSI Escape Sequence Handler файлового архиватора WinRAR, позволяющая нарушителю вызвать отказ в обслуживании или подменять вывод на экран
EPSS