ID |
CVE-2005-0331
|
Summary |
Directory traversal vulnerability in WinRAR 3.42 and earlier, when the user clicks on the ZIP file to extract it, allows remote attackers to create arbitrary files via a ... (triple dot) in the filename of the ZIP file. |
References |
|
Vulnerable Configurations |
-
cpe:2.3:a:rarlab:winrar:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:rarlab:winrar:3.0.0:*:*:*:*:*:*:*
-
cpe:2.3:a:rarlab:winrar:3.10:*:*:*:*:*:*:*
cpe:2.3:a:rarlab:winrar:3.10:*:*:*:*:*:*:*
-
cpe:2.3:a:rarlab:winrar:3.10_beta3:*:*:*:*:*:*:*
cpe:2.3:a:rarlab:winrar:3.10_beta3:*:*:*:*:*:*:*
-
cpe:2.3:a:rarlab:winrar:3.10_beta5:*:*:*:*:*:*:*
cpe:2.3:a:rarlab:winrar:3.10_beta5:*:*:*:*:*:*:*
-
cpe:2.3:a:rarlab:winrar:3.11:*:*:*:*:*:*:*
cpe:2.3:a:rarlab:winrar:3.11:*:*:*:*:*:*:*
-
cpe:2.3:a:rarlab:winrar:3.20:*:*:*:*:*:*:*
cpe:2.3:a:rarlab:winrar:3.20:*:*:*:*:*:*:*
-
cpe:2.3:a:rarlab:winrar:3.40:*:*:*:*:*:*:*
cpe:2.3:a:rarlab:winrar:3.40:*:*:*:*:*:*:*
-
cpe:2.3:a:rarlab:winrar:3.41:*:*:*:*:*:*:*
cpe:2.3:a:rarlab:winrar:3.41:*:*:*:*:*:*:*
-
cpe:2.3:a:rarlab:winrar:3.42:*:*:*:*:*:*:*
cpe:2.3:a:rarlab:winrar:3.42:*:*:*:*:*:*:*
|
CVSS |
Base: | 2.6 (as of 11-07-2017 - 01:32) |
Impact: | |
Exploitability: | |
|
CWE |
NVD-CWE-Other |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
NETWORK |
HIGH |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
NONE |
PARTIAL |
NONE |
|
cvss-vector
via4
|
AV:N/AC:H/Au:N/C:N/I:P/A:N
|
refmap
via4
|
bid | 12422 | bugtraq | 20050202 7a69Adv#21 - WinRAR unpack one-folder path disclosure | xf | winrar-dotdotdotdirectory-traversal(20585) |
|
Last major update |
11-07-2017 - 01:32 |
Published |
02-05-2005 - 04:00 |
Last modified |
11-07-2017 - 01:32 |