WinRAR < 3.71 Archive Handling Vulnerabilities

critical Nessus Plugin ID 31641

Synopsis

The remote Windows host has a program that is affected by multiple vulnerabilities.

Description

The remote host is running WinRAR, an archive manager for Windows.

The version of WinRAR installed on the remote host reportedly is affected by several heap corruption and stack-based buffer overflow vulnerabilities. If an attacker can trick a user on the affected host into opening a specially crafted archive using the affected application, this method could be used to execute arbitrary code on the affected system subject to the user's privileges.

Solution

Upgrade to WinRAR 3.71 or later.

See Also

https://www.viestintavirasto.fi/en/cybersecurity.html

Plugin Details

Severity: Critical

ID: 31641

File Name: winrar_3_71.nasl

Version: 1.13

Type: local

Agent: windows

Family: Windows

Published: 3/21/2008

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus Agent, Nessus

Risk Information

CVSS Score Rationale: Score based on in depth analysis of the vendor advisory by tenable

CVSS v2

Risk Factor: High

Base Score: 9.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: manual

CVSS v3

Risk Factor: Critical

Base Score: 9.6

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:/a:rarlab:winrar

Required KB Items: SMB/Registry/Enumerated, installed_sw/RARLAB WinRAR

Patch Publication Date: 3/21/2008

Vulnerability Publication Date: 3/21/2008

Reference Information

SECUNIA: 29407