Lucene search

K
kasperskyKaspersky LabKLA11427
HistoryFeb 05, 2019 - 12:00 a.m.

KLA11427 Multiple ACE vulnerabilities in WinRAR

2019-02-0500:00:00
Kaspersky Lab
threats.kaspersky.com
684

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

8.1

Confidence

High

EPSS

0.973

Percentile

99.9%

Multiple vulnerabilities were found in WinRAR. Malicious users can exploit these vulnerabilities to execute arbitrary code, bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. A logical issue can be exploited locally via specially crafted filename of the ACE archive to execute arbitrary code;
  2. A validation issue can be exploited locally via specially crafted filename the ACE archive to bypass security restrictions;
  3. An out-of-bounds writes vulnerability can be exploited locally via specially crafted ACE or RAR archive to execute arbitrary code;
  4. An out-of-bounds writes vulnerability can be exploited locally via specially crafted LZA or LZH archive to execute arbitrary code;

Original advisories

Extracting a 19 Year Old Code Execution from WinRAR

Security Week 09

Exploitation

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Related products

WinRAR

CVE list

CVE-2018-20250 critical

CVE-2018-20251 high

CVE-2018-20252 critical

CVE-2018-20253 critical

Solution

Update to the latest version

WinRAR and RAR archiver downloads

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • SB

Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.

Affected Products

  • WinRAR 5.x earlier than 5.70

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

8.1

Confidence

High

EPSS

0.973

Percentile

99.9%