WinRAR < 3.71 Archive Handling Vulnerabilities

This script is Copyright (C) 2008-2015 Tenable Network Security, Inc.


Synopsis :

The remote Windows host has a program that is affected by multiple
vulnerabilities.

Description :

The remote host is running WinRAR, an archive manager for Windows.

The version of WinRAR installed on the remote host reportedly is
affected by several heap corruption and stack-based buffer overflow
vulnerabilities. If an attacker can trick a user on the affected host
into opening a specially crafted archive using the affected
application, this method could be used to execute arbitrary code on
the affected system subject to the user's privileges.

See also :

http://www.cert.fi/haavoittuvuudet/joint-advisory-archive-formats.html

Solution :

Upgrade to WinRAR 3.71 or later.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)

Family: Windows

Nessus Plugin ID: 31641 ()

Bugtraq ID:

CVE ID:

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now