CWE
NVD-CWE-Other 119
Advisory Published
Updated

CVE-2005-4474: Buffer Overflow

First published: Thu Dec 22 2005(Updated: )

Buffer overflow in the "Add to archive" command in WinRAR 3.51 allows user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code by tricking the user into adding a file whose filename contains a non-default code page and non-ANSI characters, as demonstrated using a Chinese filename, possibly due to buffer expansion when using the WideCharToMultiByte API. NOTE: it is not clear whether this problem can be exploited for code execution. If not, then perhaps the user-assisted nature of the attack should exclude the issue from inclusion in CVE.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
WinRAR=3.51

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2005-4474?

    CVE-2005-4474 is rated as a high severity vulnerability due to its ability to cause denial of service and potentially allow arbitrary code execution.

  • How do I fix CVE-2005-4474?

    To mitigate CVE-2005-4474, users should upgrade to WinRAR version 3.51 or later, or avoid opening files with non-default code page filenames.

  • What types of attacks are possible with CVE-2005-4474?

    CVE-2005-4474 may allow user-assisted attacks that lead to a crash of the application or execution of arbitrary code.

  • What is the cause of CVE-2005-4474?

    CVE-2005-4474 is caused by a buffer overflow vulnerability in the "Add to archive" command of WinRAR 3.51.

  • Which version of WinRAR is affected by CVE-2005-4474?

    WinRAR version 3.51 is the affected version as per CVE-2005-4474.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203