First published: Sat Dec 31 2005(Updated: )
Buffer overflow in WinRAR 3.50 and earlier allows local users to execute arbitrary code via a long command-line argument. NOTE: because this program executes with the privileges of the invoking user, and because remote programs do not normally have the ability to specify a command-line argument for this program, there may not be a typical attack vector for the issue that crosses privilege boundaries. Therefore this may not be a vulnerability.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
RARLAB WinRAR | =3.50 | |
RARLAB WinRAR | =3.0.0 | |
RARLAB WinRAR | =3.10 | |
RARLAB WinRAR | =3.41 | |
RARLAB WinRAR | =3.20 | |
RARLAB WinRAR | =3.42 | |
RARLAB WinRAR | =3.30 | |
RARLAB WinRAR | =2.90 | |
RARLAB WinRAR | =3.40 | |
RARLAB WinRAR | =3.10_beta3 | |
RARLAB WinRAR | =3.10_beta5 | |
RARLAB WinRAR | =3.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.