ID |
CVE-2005-4474
|
Summary |
Buffer overflow in the "Add to archive" command in WinRAR 3.51 allows user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code by tricking the user into adding a file whose filename contains a non-default code page and non-ANSI characters, as demonstrated using a Chinese filename, possibly due to buffer expansion when using the WideCharToMultiByte API. NOTE: it is not clear whether this problem can be exploited for code execution. If not, then perhaps the user-assisted nature of the attack should exclude the issue from inclusion in CVE. |
References |
|
Vulnerable Configurations |
|
CVSS |
Base: | 5.1 (as of 19-10-2018 - 15:41) |
Impact: | |
Exploitability: | |
|
CWE |
NVD-CWE-Other |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
NETWORK |
HIGH |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
PARTIAL |
PARTIAL |
PARTIAL |
|
cvss-vector
via4
|
AV:N/AC:H/Au:N/C:P/I:P/A:P
|
refmap
via4
|
bid | 15999 | bugtraq | 20051221 WinRAR - Processing Filename Incorrectly Vulnerability | sreason | 290 |
|
Last major update |
19-10-2018 - 15:41 |
Published |
22-12-2005 - 01:03 |
Last modified |
19-10-2018 - 15:41 |