First published: Wed Dec 30 2015(Updated: )
The file-execution functionality in WinRAR before 5.30 beta 5 allows local users to gain privileges via a Trojan horse file with a name similar to an extensionless filename that was selected by the user.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
RARLAB WinRAR | <=5.30 | |
RARLAB WinRAR | <=5.30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5663 is considered a high-severity vulnerability due to its potential to allow local users to gain elevated privileges.
To fix CVE-2015-5663, upgrade WinRAR to version 5.30 beta 5 or later.
CVE-2015-5663 affects users of WinRAR versions prior to 5.30 beta 5 on both x86 and x64 platforms.
CVE-2015-5663 is a local privilege escalation vulnerability related to file-execution functionality.
CVE-2015-5663 is not a remote vulnerability; it requires local user access to exploit.