First published: Sat Dec 31 2005(Updated: )
Buffer overflow in WinRAR 3.50 and earlier allows local users to execute arbitrary code via a long command-line argument. NOTE: because this program executes with the privileges of the invoking user, and because remote programs do not normally have the ability to specify a command-line argument for this program, there may not be a typical attack vector for the issue that crosses privilege boundaries. Therefore this may not be a vulnerability.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WinRAR | =3.50 | |
WinRAR | =3.0.0 | |
WinRAR | =3.10 | |
WinRAR | =3.41 | |
WinRAR | =3.20 | |
WinRAR | =3.42 | |
WinRAR | =3.30 | |
WinRAR | =2.90 | |
WinRAR | =3.40 | |
WinRAR | =3.10_beta3 | |
WinRAR | =3.10_beta5 | |
WinRAR | =3.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-4620 has a high severity rating due to its potential to allow local users to execute arbitrary code.
To fix CVE-2005-4620, upgrade to a version of WinRAR that is newer than 3.50, as it addresses this vulnerability.
Local users of WinRAR versions 3.50 and earlier are affected by CVE-2005-4620.
CVE-2005-4620 is categorized as a buffer overflow vulnerability.
CVE-2005-4620 cannot be exploited remotely as it requires local execution by a user with access to the system.