Описание
RARLAB WinRAR before 7.00, on Linux and UNIX platforms, allows attackers to spoof the screen output, or cause a denial of service, via ANSI escape sequences.
Пакеты
| Пакет | Статус | Версия исправления | Релиз | Тип |
|---|---|---|---|---|
| rar | fixed | 2:7.00-1 | package | |
| rar | fixed | 2:7.01-1~deb12u1 | bookworm | package |
| rar | no-dsa | bullseye | package | |
| unrar-nonfree | fixed | 1:7.0.3-1 | package | |
| unrar-nonfree | ignored | bookworm | package | |
| unrar-nonfree | no-dsa | bullseye | package |
Примечания
https://sdushantha.medium.com/ansi-escape-injection-vulnerability-in-winrar-a2cbfac4b983
Связанные уязвимости
RARLAB WinRAR before 7.00, on Linux and UNIX platforms, allows attackers to spoof the screen output, or cause a denial of service, via ANSI escape sequences.
RARLAB WinRAR before 7.00, on Linux and UNIX platforms, allows attackers to spoof the screen output, or cause a denial of service, via ANSI escape sequences.
RARLAB WinRAR before 7.00, on Linux and UNIX platforms, allows attackers to spoof the screen output, or cause a denial of service, via ANSI escape sequences.
Уязвимость компонента ANSI Escape Sequence Handler файлового архиватора WinRAR, позволяющая нарушителю вызвать отказ в обслуживании или подменять вывод на экран