CVE-2005-3262

Format string vulnerability in RARLAB WinRAR 2.90 through 3.50 allows remote attackers to execute arbitrary code via format string specifiers in a UUE/XXE file, which are not properly handled when WinRAR displays diagnostic errors related to an invalid filename.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:rarlab:winrar:2.90:*:*:*:*:*:*:*
cpe:2.3:a:rarlab:winrar:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:rarlab:winrar:3.10:*:*:*:*:*:*:*
cpe:2.3:a:rarlab:winrar:3.10_beta3:*:*:*:*:*:*:*
cpe:2.3:a:rarlab:winrar:3.10_beta5:*:*:*:*:*:*:*
cpe:2.3:a:rarlab:winrar:3.11:*:*:*:*:*:*:*
cpe:2.3:a:rarlab:winrar:3.20:*:*:*:*:*:*:*
cpe:2.3:a:rarlab:winrar:3.40:*:*:*:*:*:*:*
cpe:2.3:a:rarlab:winrar:3.41:*:*:*:*:*:*:*
cpe:2.3:a:rarlab:winrar:3.42:*:*:*:*:*:*:*
cpe:2.3:a:rarlab:winrar:3.50:*:*:*:*:*:*:*

History

21 Nov 2024, 00:01

Type Values Removed Values Added
References () http://secunia.com/advisories/16973/ - Patch, Vendor Advisory () http://secunia.com/advisories/16973/ - Patch, Vendor Advisory
References () http://secunia.com/secunia_research/2005-53/advisory/ - Patch, Vendor Advisory () http://secunia.com/secunia_research/2005-53/advisory/ - Patch, Vendor Advisory
References () http://www.rarlabs.com/rarnew.htm - () http://www.rarlabs.com/rarnew.htm -
References () http://www.securityfocus.com/bid/15062 - Patch () http://www.securityfocus.com/bid/15062 - Patch

Information

Published : 2005-10-20 10:02

Updated : 2024-11-21 00:01


NVD link : CVE-2005-3262

Mitre link : CVE-2005-3262

CVE.ORG link : CVE-2005-3262


JSON object : View

Products Affected

rarlab

  • winrar