First published: Thu Jul 01 2021(Updated: )
UnRAR 5.6.1.2 and 5.6.1.3 has a heap-based buffer overflow in Unpack::CopyString (called from Unpack::Unpack5 and CmdExtract::ExtractCurrentFile).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
UnRAR | =5.6.1.2 | |
UnRAR | =5.6.1.3 | |
Linux Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of UnRAR is CVE-2017-20006.
The severity rating of CVE-2017-20006 is high.
The affected version of UnRAR is 5.6.1.2 and 5.6.1.3.
The vulnerability manifests as a heap-based buffer overflow in Unpack::CopyString (called from Unpack::Unpack5 and CmdExtract::ExtractCurrentFile).
No, the Linux kernel is not affected by this vulnerability.
Yes, a fix for this vulnerability has been implemented in the following commit: https://github.com/aawc/unrar/commit/0ff832d31470471803b175cfff4e40c1b08ee779