WinRAR < 6.23 RCE

high Nessus Plugin ID 180174

Synopsis

The remote Windows host has an application installed which is affected by a remote code execution vulnerability.

Description

The remote host is running WinRAR, an archive manager for Windows.

The version of WinRAR installed on the remote host is affected by a an improper validation of user-supplied data, which can result in memory access past the end of an allocated buffer which can be exploited remotely and may allow attackers to execute code in the context of the current process.

Solution

Upgrade to WinRAR version 6.23 or later.

See Also

https://www.zerodayinitiative.com/advisories/ZDI-23-1152/

https://www.rarlab.com/rarnew.htm

Plugin Details

Severity: High

ID: 180174

File Name: winrar_623.nasl

Version: 1.6

Type: local

Agent: windows

Family: Windows

Published: 8/24/2023

Updated: 5/3/2024

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.7

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2023-40477

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7.5

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

CVSS Score Source: CVE-2023-38831

Vulnerability Information

CPE: cpe:/a:rarlab:winrar

Required KB Items: SMB/Registry/Enumerated, installed_sw/RARLAB WinRAR

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/17/2023

Vulnerability Publication Date: 8/17/2023

CISA Known Exploited Vulnerability Due Dates: 9/14/2023

Exploitable With

Core Impact

Metasploit (WinRAR CVE-2023-38831 Exploit)

Reference Information

CVE: CVE-2023-38831, CVE-2023-40477

IAVA: 2023-A-0436-S