Vulnerability Description
unrar 0.0.1 (aka unrar-free or unrar-gpl) suffers from a stack-based buffer over-read in unrarlib.c, related to ExtrFile and stricomp.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Rarlab | Unrar | 0.0.1 |
| Debian | Debian Linux | 9.0 |
Related Weaknesses (CWE)
References
- http://www.openwall.com/lists/oss-security/2017/08/20/1Mailing ListThird Party Advisory
- https://bugs.debian.org/874060Issue TrackingThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2021/02/msg00026.htmlMailing ListThird Party Advisory
- http://www.openwall.com/lists/oss-security/2017/08/20/1Mailing ListThird Party Advisory
- https://bugs.debian.org/874060Issue TrackingThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2021/02/msg00026.htmlMailing ListThird Party Advisory
FAQ
What is CVE-2017-14122?
CVE-2017-14122 is a vulnerability with a CVSS score of 9.1 (CRITICAL). unrar 0.0.1 (aka unrar-free or unrar-gpl) suffers from a stack-based buffer over-read in unrarlib.c, related to ExtrFile and stricomp.
How severe is CVE-2017-14122?
CVE-2017-14122 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2017-14122?
Check the references section above for vendor advisories and patch information. Affected products include: Rarlab Unrar, Debian Debian Linux.