Дата обнаружения
|
17/12/2015 |
Уровень угрозы
|
Warning |
Описание
|
Improper files handling was found in WinRAR. By exploiting this vulnerability malicious users can execute arbitrary code with WinRAR privileges. This vulnerability can be exploited remotely via a specially designed archive. Technical details This vulnerability related to two WinRAR functions:one which allows execute arbitrary local file. If that file does not have extension — file with same name but with extension will be executed. And other which allow to save and load registry settings. If executable file with regedit name will exists in current folder that file will be executed instead of Windows registry editor. |
Пораженные продукты
|
Winrar versions earlier than 5.30 beta 5 |
Решение
|
Update to the latest version |
Первичный источник обнаружения
|
JVN advisory |
Оказываемое влияние
?
|
PE
[?]
|
Связанные продукты
|
WinRAR |
CVE-IDS
|
|
Узнай статистику распространения уязвимостей в твоем регионе |