First published: Fri May 03 2024(Updated: )
Last updated 12 March 2025
Credit: zdi-disclosures@trendmicro.com zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
WinRAR | ||
debian/libclamunrar | 0.103.10-1~deb11u1 1.0.3-1~deb11u1 1.0.3-1~deb12u1 1.3.1-1 | |
debian/rar | 2:6.23-1~deb11u1 2:6.23-1~deb12u1 2:7.10-2 | |
debian/unrar-nonfree | 1:6.0.3-1+deb11u3 1:6.2.6-1+deb12u1 1:7.1.5-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-40477 is classified as critical due to the potential for remote code execution.
To fix CVE-2023-40477, update WinRAR to the latest version or apply available patches from RARLAB.
CVE-2023-40477 affects RARLAB WinRAR and specific versions of libclamunrar and rar packages on Ubuntu and Debian.
CVE-2023-40477 can be exploited through specially crafted RAR files, requiring user interaction to execute the malicious code.
Yes, user interaction is required to exploit CVE-2023-40477, as the attacker must trick the user into opening a crafted RAR file.