Vulnerability Description
Buffer overflow in the "Add to archive" command in WinRAR 3.51 allows user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code by tricking the user into adding a file whose filename contains a non-default code page and non-ANSI characters, as demonstrated using a Chinese filename, possibly due to buffer expansion when using the WideCharToMultiByte API. NOTE: it is not clear whether this problem can be exploited for code execution. If not, then perhaps the user-assisted nature of the attack should exclude the issue from inclusion in CVE.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Rarlab | Winrar | 3.51 |
References
- http://securityreason.com/securityalert/290
- http://www.securityfocus.com/archive/1/420006/100/0/threaded
- http://www.securityfocus.com/bid/15999
- http://securityreason.com/securityalert/290
- http://www.securityfocus.com/archive/1/420006/100/0/threaded
- http://www.securityfocus.com/bid/15999
FAQ
What is CVE-2005-4474?
CVE-2005-4474 is a vulnerability with a CVSS score of 5.1 (MEDIUM). Buffer overflow in the "Add to archive" command in WinRAR 3.51 allows user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code by tricking the user into adding ...
How severe is CVE-2005-4474?
CVE-2005-4474 has been rated MEDIUM with a CVSS base score of 5.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-4474?
Check the references section above for vendor advisories and patch information. Affected products include: Rarlab Winrar.