First published: Thu Feb 10 2005(Updated: )
Directory traversal vulnerability in WinRAR 3.42 and earlier, when the user clicks on the ZIP file to extract it, allows remote attackers to create arbitrary files via a ... (triple dot) in the filename of the ZIP file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WinRAR | =3.0.0 | |
WinRAR | =3.10 | |
WinRAR | =3.10_beta3 | |
WinRAR | =3.10_beta5 | |
WinRAR | =3.11 | |
WinRAR | =3.20 | |
WinRAR | =3.40 | |
WinRAR | =3.41 | |
WinRAR | =3.42 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0331 is considered a medium severity vulnerability due to the potential for file creation exploits.
To fix CVE-2005-0331, users should upgrade to a version of WinRAR later than 3.42.
The impact of CVE-2005-0331 allows remote attackers to create arbitrary files on the user's system.
CVE-2005-0331 affects WinRAR versions 3.42 and earlier.
Yes, CVE-2005-0331 is a directory traversal vulnerability that exploits the ZIP file extraction process.