A vulnerability has been reported in RARLabs UnRAR, which can be exploited by malicious people to compromise a user's system.
The vulnerability is caused due to a boundary error when processing password-protected archives using the UnRAR command line utility. This can be exploited to cause a stack-based buffer overflow via a specially crafted password-protected archive.
Successful exploitation requires that the user is e.g. tricked into opening a password-protected archive and respond to the password prompt.
The vulnerability is reported in version 3.60 for Linux and 3.61 for Windows. Other versions may also be affected.
Solution: The vendor has issued version 3.70 beta release.
Provided and/or discovered by: Discovered by an anonymous person and reported via iDefense Labs.
Original Advisory: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=472
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org