SB2017090303 - Multiple vulnerabilities in RARLAB UnRar
Published: September 3, 2017 Updated: August 8, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Path traversal (CVE-ID: CVE-2017-14120)
The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
unrar 0.0.1 (aka unrar-free or unrar-gpl) suffers from a directory traversal vulnerability for RAR v2 archives: pathnames of the form ../[filename] are unpacked into the upper directory.
2) NULL pointer dereference (CVE-ID: CVE-2017-14121)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error in unrarlib.c in unrar 0.0.1 (aka unrar-free or unrar-gpl) suffers from a NULL pointer dereference flaw triggered by a specially crafted RAR archive. A remote attacker can perform a denial of service (DoS) attack.
3) Out-of-bounds read (CVE-ID: CVE-2017-14122)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
unrar 0.0.1 (aka unrar-free or unrar-gpl) suffers from a stack-based buffer over-read in unrarlib.c, related to ExtrFile and stricomp.
Remediation
Cybersecurity Help is not aware of any official remediation provided by the vendor.