Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2023-40477

Опубликовано: 03 мая 2024
Источник: nvd
CVSS3: 7.8
EPSS Критический

Описание

RARLAB WinRAR Recovery Volume Improper Validation of Array Index Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the processing of recovery volumes. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-21233.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:rarlab:winrar:*:*:*:*:*:*:*:*
Версия до 6.23 (исключая)

EPSS

Процентиль: 100%
0.92803
Критический

7.8 High

CVSS3

Дефекты

CWE-129

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 2 года назад

RARLAB WinRAR Recovery Volume Improper Validation of Array Index Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of recovery volumes. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-21233.

CVSS3: 7.8
debian
почти 2 года назад

RARLAB WinRAR Recovery Volume Improper Validation of Array Index Remot ...

suse-cvrf
около 2 лет назад

Security update for clamav

suse-cvrf
больше 2 лет назад

Security update for clamav

CVSS3: 7.8
github
почти 2 года назад

RARLAB WinRAR Recovery Volume Improper Validation of Array Index Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of recovery volumes. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-21233.

EPSS

Процентиль: 100%
0.92803
Критический

7.8 High

CVSS3

Дефекты

CWE-129