mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-29 09:41:05 +00:00
27 lines
1.2 KiB
Markdown
27 lines
1.2 KiB
Markdown
![]() |
### [CVE-2018-20252](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20252)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
In WinRAR versions prior to and including 5.60, there is an out-of-bounds write vulnerability during parsing of crafted ACE and RAR archive formats. Successful exploitation could lead to arbitrary code execution in the context of the current user.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- https://research.checkpoint.com/extracting-code-execution-from-winrar/
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/ARPSyndicate/cvemon
|
||
|
- https://github.com/DanielEbert/winafl
|
||
|
- https://github.com/Team-BT5/WinAFL-RDP
|
||
|
- https://github.com/bacon-tomato-spaghetti/WinAFL-RDP
|
||
|
- https://github.com/googleprojectzero/winafl
|
||
|
- https://github.com/hardik05/winafl-powermopt
|
||
|
- https://github.com/pranav0408/WinAFL
|
||
|
- https://github.com/ssumachai/CS182-Project
|
||
|
- https://github.com/v3nt4n1t0/DetectWinRARaceVulnDomain.ps1
|
||
|
- https://github.com/yrime/WinAflCustomMutate
|
||
|
|