跳转到帖子

Rarlab WinRAR: The vulnerability allows remote attackers to execute arbitrary code on affected installations (CVE-2023-40477)

recommended_posts

发布于
  • Members

Rarlab WinRAR: The vulnerability allows remote attackers to execute arbitrary code on affected installations (CVE-2023-40477)

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
08/24/2023
Created
08/24/2023
Added
08/24/2023
Modified
05/06/2024

Description

RARLAB WinRAR Recovery Volume Improper Validation of Array Index Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of recovery volumes. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-21233.

Solution(s)

  • rarlab-winrar-upgrade-6_23

References

  • https://attackerkb.com/topics/cve-2023-40477
  • CVE - 2023-40477
  • 查看数 702
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…