CVE-2012-6706

critical
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

A VMSF_DELTA memory corruption was discovered in unrar before 5.5.5, as used in Sophos Anti-Virus Threat Detection Engine before 3.37.2 and other products, that can lead to arbitrary code execution. An integer overflow can be caused in DataSize+CurChannel. The result is a negative value of the "DestPos" variable, which allows the attacker to write out of bounds when setting Mem[DestPos].

References

http://securitytracker.com/id?1027725

http://telussecuritylabs.com/threats/show/TSL20121207-01

https://bugs.chromium.org/p/project-zero/issues/detail?id=1286

https://community.sophos.com/kb/en-us/118424#six

https://kc.mcafee.com/corporate/index?page=content&id=SB10205

https://lock.cmpxchg8b.com/sophailv2.pdf

https://nakedsecurity.sophos.com/2012/11/05/tavis-ormandy-sophos/

https://security.gentoo.org/glsa/201708-05

https://security.gentoo.org/glsa/201709-24

https://security.gentoo.org/glsa/201804-16

Details

Source: MITRE

Published: 2017-06-22

Updated: 2018-10-21

Type: CWE-190

Risk Information

CVSS v2

Base Score: 10

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 10

Severity: HIGH

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Impact Score: 5.9

Exploitability Score: 3.9

Severity: CRITICAL

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:sophos:threat_detection_engine:*:*:*:*:*:*:*:* versions up to 3.36.2 (inclusive)

Configuration 2

OR

cpe:2.3:a:rarlab:unrar:*:*:*:*:*:*:*:* versions up to 5.5.4 (inclusive)

Tenable Plugins

View all (19 total)

IDNameProductFamilySeverity
109230GLSA-201804-16 : ClamAV: Multiple vulnerabilitiesNessusGentoo Local Security Checks
critical
108829SUSE SLES11 Security Update : clamav (SUSE-SU-2018:0863-1)NessusSuSE Local Security Checks
critical
108828SUSE SLES11 Security Update : unrar (SUSE-SU-2018:0862-1)NessusSuSE Local Security Checks
critical
108652SUSE SLED12 / SLES12 Security Update : clamav (SUSE-SU-2018:0809-1)NessusSuSE Local Security Checks
critical
108637openSUSE Security Update : clamav (openSUSE-2018-314)NessusSuSE Local Security Checks
critical
108601Amazon Linux AMI : clamav (ALAS-2018-976)NessusAmazon Linux Local Security Checks
critical
108311Fedora 26 : clamav (2018-d2b08aa37f)NessusFedora Local Security Checks
critical
107169Fedora 27 : clamav (2018-602b5345fa)NessusFedora Local Security Checks
critical
104064GLSA-201710-21 : Kodi: Arbitrary code executionNessusGentoo Local Security Checks
critical
103463GLSA-201709-24 : RAR, UnRAR: Multiple vulnerabilitiesNessusGentoo Local Security Checks
critical
103163openSUSE Security Update : unrar (openSUSE-2017-724)NessusSuSE Local Security Checks
critical
102617GLSA-201708-05 : RAR and UnRAR: User-assisted execution of arbitrary codeNessusGentoo Local Security Checks
critical
102496McAfee Web Gateway 7.6.x < 7.6.2.15 / 7.7.x < 7.7.2.3 Multiple Vulnerabilities (SB10205)NessusMisc.
critical
101277openSUSE Security Update : clamav (openSUSE-2017-779)NessusSuSE Local Security Checks
critical
101222SUSE SLES11 Security Update : clamav (SUSE-SU-2017:1763-1)NessusSuSE Local Security Checks
critical
101221SUSE SLES11 Security Update : unrar (SUSE-SU-2017:1760-1)NessusSuSE Local Security Checks
critical
101204SUSE SLED12 / SLES12 Security Update : unrar (SUSE-SU-2017:1745-1)NessusSuSE Local Security Checks
critical
101143SUSE SLED12 / SLES12 Security Update : clamav (SUSE-SU-2017:1716-1)NessusSuSE Local Security Checks
critical
101065Debian DLA-1003-1 : unrar-nonfree security updateNessusDebian Local Security Checks
critical