4.6
CVSSv2

CVE-2005-4620

Published: 31/12/2005 Updated: 19/10/2018
CVSS v2 Base Score: 4.6 | Impact Score: 6.4 | Exploitability Score: 3.9
VMScore: 470
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Buffer overflow in WinRAR 3.50 and previous versions allows local users to execute arbitrary code via a long command-line argument. NOTE: because this program executes with the privileges of the invoking user, and because remote programs do not normally have the ability to specify a command-line argument for this program, there may not be a typical attack vector for the issue that crosses privilege boundaries. Therefore this may not be a vulnerability.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

rarlab winrar 3.0.0

rarlab winrar 3.10

rarlab winrar 3.41

rarlab winrar 3.42

rarlab winrar 3.11

rarlab winrar 3.20

rarlab winrar 2.90

rarlab winrar 3.30

rarlab winrar 3.40

rarlab winrar 3.10_beta3

rarlab winrar 3.10_beta5

rarlab winrar 3.50

Exploits

/* WinRAR Buffer Overflow 330 Exploit * * Bug founded by: Vredited By Alpha Programmer & Trap-Set UH Team * Exploit made by: K4P0 * Contact: k4p0k4p0@hotmailcom */ #include <stdioh> #include <windowsh> int main(void) { char EvilBuff[1024]; // Normal cmdexe shellcode char shellcode[] = "\x55\x8B\xEC\x33\xFF\x57\x83 ...
/* IHS public source code WinRAR 330 and below local BOF exploit author : c0d3r , kaveh razavi <c0d3r@ihsteamcom> advisory : wwwsecurityfocuscom/archive/1/420679 tnx to alpha who reported the vulnerability workaround: use the lastest version special tnx to LorD and NT of IHS (my workmates and best friends) wwwihsteamcom ...