First published: Thu Dec 22 2005(Updated: )
Buffer overflow in the "Add to archive" command in WinRAR 3.51 allows user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code by tricking the user into adding a file whose filename contains a non-default code page and non-ANSI characters, as demonstrated using a Chinese filename, possibly due to buffer expansion when using the WideCharToMultiByte API. NOTE: it is not clear whether this problem can be exploited for code execution. If not, then perhaps the user-assisted nature of the attack should exclude the issue from inclusion in CVE.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WinRAR | =3.51 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-4474 is rated as a high severity vulnerability due to its ability to cause denial of service and potentially allow arbitrary code execution.
To mitigate CVE-2005-4474, users should upgrade to WinRAR version 3.51 or later, or avoid opening files with non-default code page filenames.
CVE-2005-4474 may allow user-assisted attacks that lead to a crash of the application or execution of arbitrary code.
CVE-2005-4474 is caused by a buffer overflow vulnerability in the "Add to archive" command of WinRAR 3.51.
WinRAR version 3.51 is the affected version as per CVE-2005-4474.