CVE-2005-4620

Buffer overflow in WinRAR 3.50 and earlier allows local users to execute arbitrary code via a long command-line argument. NOTE: because this program executes with the privileges of the invoking user, and because remote programs do not normally have the ability to specify a command-line argument for this program, there may not be a typical attack vector for the issue that crosses privilege boundaries. Therefore this may not be a vulnerability.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:rarlab:winrar:2.90:*:*:*:*:*:*:*
cpe:2.3:a:rarlab:winrar:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:rarlab:winrar:3.10:*:*:*:*:*:*:*
cpe:2.3:a:rarlab:winrar:3.10_beta3:*:*:*:*:*:*:*
cpe:2.3:a:rarlab:winrar:3.10_beta5:*:*:*:*:*:*:*
cpe:2.3:a:rarlab:winrar:3.11:*:*:*:*:*:*:*
cpe:2.3:a:rarlab:winrar:3.20:*:*:*:*:*:*:*
cpe:2.3:a:rarlab:winrar:3.30:*:*:*:*:*:*:*
cpe:2.3:a:rarlab:winrar:3.40:*:*:*:*:*:*:*
cpe:2.3:a:rarlab:winrar:3.41:*:*:*:*:*:*:*
cpe:2.3:a:rarlab:winrar:3.42:*:*:*:*:*:*:*
cpe:2.3:a:rarlab:winrar:3.50:*:*:*:*:*:*:*

History

21 Nov 2024, 00:04

Type Values Removed Values Added
References () http://www.rarlab.com/rarnew.htm - () http://www.rarlab.com/rarnew.htm -
References () http://www.securityfocus.com/archive/1/420679/100/0/threaded - () http://www.securityfocus.com/archive/1/420679/100/0/threaded -
References () http://www.securityfocus.com/bid/15123 - Exploit () http://www.securityfocus.com/bid/15123 - Exploit
References () http://www.securityfocus.com/data/vulnerabilities/exploits/0xletzdance.c - Exploit () http://www.securityfocus.com/data/vulnerabilities/exploits/0xletzdance.c - Exploit

Information

Published : 2005-12-31 05:00

Updated : 2024-11-21 00:04


NVD link : CVE-2005-4620

Mitre link : CVE-2005-4620

CVE.ORG link : CVE-2005-4620


JSON object : View

Products Affected

rarlab

  • winrar