ID CVE-2005-4474
Summary Buffer overflow in the "Add to archive" command in WinRAR 3.51 allows user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code by tricking the user into adding a file whose filename contains a non-default code page and non-ANSI characters, as demonstrated using a Chinese filename, possibly due to buffer expansion when using the WideCharToMultiByte API. NOTE: it is not clear whether this problem can be exploited for code execution. If not, then perhaps the user-assisted nature of the attack should exclude the issue from inclusion in CVE.
References
Vulnerable Configurations
  • cpe:2.3:a:rarlab:winrar:3.51:*:*:*:*:*:*:*
    cpe:2.3:a:rarlab:winrar:3.51:*:*:*:*:*:*:*
CVSS
Base: 5.1 (as of 19-10-2018 - 15:41)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK HIGH NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:H/Au:N/C:P/I:P/A:P
refmap via4
bid 15999
bugtraq 20051221 WinRAR - Processing Filename Incorrectly Vulnerability
sreason 290
Last major update 19-10-2018 - 15:41
Published 22-12-2005 - 01:03
Last modified 19-10-2018 - 15:41
Back to Top