Detect date
?
|
12/17/2015 |
Severity
?
|
Warning |
Description
|
Improper files handling was found in WinRAR. By exploiting this vulnerability malicious users can execute arbitrary code with WinRAR privileges. This vulnerability can be exploited remotely via a specially designed archive. Technical details This vulnerability related to two WinRAR functions:one which allows execute arbitrary local file. If that file does not have extension – file with same name but with extension will be executed. And other which allow to save and load registry settings. If executable file with regedit name will exists in current folder that file will be executed instead of Windows registry editor. |
Affected products
|
Winrar versions earlier than 5.30 beta 5 |
Solution
|
Update to the latest version |
Original advisories
|
|
Impacts
?
|
PE [?] |
Related products
|
WinRAR |
CVE-IDS
?
|
|
Find out the statistics of the vulnerabilities spreading in your region |