WinRAR < 3.71 Archive Handling Vulnerabilities

This script is Copyright (C) 2008-2015 Tenable Network Security, Inc.

Synopsis :

The remote Windows host has a program that is affected by multiple

Description :

The remote host is running WinRAR, an archive manager for Windows.

The version of WinRAR installed on the remote host reportedly is
affected by several heap corruption and stack-based buffer overflow
vulnerabilities. If an attacker can trick a user on the affected host
into opening a specially crafted archive using the affected
application, this method could be used to execute arbitrary code on
the affected system subject to the user's privileges.

See also :

Solution :

Upgrade to WinRAR 3.71 or later.

Risk factor :

High / CVSS Base Score : 9.3

Family: Windows

Nessus Plugin ID: 31641 ()

Bugtraq ID:


Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now