Vulnerability Description
The file-execution functionality in WinRAR before 5.30 beta 5 allows local users to gain privileges via a Trojan horse file with a name similar to an extensionless filename that was selected by the user.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Rarlab | Winrar | <= 5.30 |
Related Weaknesses (CWE)
References
- http://jvn.jp/en/jp/JVN64636058/index.htmlVendor Advisory
- http://jvndb.jvn.jp/jvndb/JVNDB-2015-000199Vendor Advisory
- http://www.securityfocus.com/bid/79666
- http://www.securitytracker.com/id/1034881
- http://jvn.jp/en/jp/JVN64636058/index.htmlVendor Advisory
- http://jvndb.jvn.jp/jvndb/JVNDB-2015-000199Vendor Advisory
- http://www.securityfocus.com/bid/79666
- http://www.securitytracker.com/id/1034881
FAQ
What is CVE-2015-5663?
CVE-2015-5663 is a vulnerability with a CVSS score of 7.4 (HIGH). The file-execution functionality in WinRAR before 5.30 beta 5 allows local users to gain privileges via a Trojan horse file with a name similar to an extensionless filename that was selected by the us...
How severe is CVE-2015-5663?
CVE-2015-5663 has been rated HIGH with a CVSS base score of 7.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-5663?
Check the references section above for vendor advisories and patch information. Affected products include: Rarlab Winrar.