- Synchronized data.

This commit is contained in:
CVE Team 2019-03-14 14:06:18 -04:00
parent 3c92b6b82f
commit dca6b7ba2e
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
4 changed files with 35 additions and 2 deletions

View File

@ -35,7 +35,7 @@
"description_data" : [ "description_data" : [
{ {
"lang" : "eng", "lang" : "eng",
"value" : "A validation function (in WinRAR code) is being called before extraction of ACE archives. The validation function inspects the filename field for each compressed file in the ACE archive. In case the filename is disallow by the validator function (for example, the filename contains path traversal patterns) The extraction operation should be aborted and no file or folder should be extracted. However, the check of the return value from the validator function made too late (in UNACEV2.dll), after the creation of files and folders. It prevent the write operation to the extracted files only." "value" : "In WinRAR versions prior to and including 5.61, there is path traversal vulnerability when crafting the filename field of the ACE format. The UNACE module (UNACEV2.dll) creates files and folders as written in the filename field even when WinRAR validator noticed the traversal attempt and requestd to abort the extraction process. the operation is cancelled only after the folders and files were created but prior to them being written, therefore allowing the attacker to create empty files and folders everywhere in the file system."
} }
] ]
}, },
@ -58,6 +58,11 @@
"refsource" : "MISC", "refsource" : "MISC",
"url" : "https://www.win-rar.com/whatsnew.html" "url" : "https://www.win-rar.com/whatsnew.html"
}, },
{
"name" : "https://research.checkpoint.com/extracting-code-execution-from-winrar/",
"refsource" : "MISC",
"url" : "https://research.checkpoint.com/extracting-code-execution-from-winrar/"
},
{ {
"name" : "106948", "name" : "106948",
"refsource" : "BID", "refsource" : "BID",

View File

@ -35,7 +35,7 @@
"description_data" : [ "description_data" : [
{ {
"lang" : "eng", "lang" : "eng",
"value" : "There is an out-of-bounds writes vulnerability during parsing of crafted ACE and RAR archive formats. Successful exploitation could lead to arbitrary code execution in the context of the current user." "value" : "In WinRAR versions prior to and including 5.60, there is an out-of-bounds write vulnerability during parsing of crafted ACE and RAR archive formats. Successful exploitation could lead to arbitrary code execution in the context of the current user."
} }
] ]
}, },
@ -58,6 +58,11 @@
"refsource" : "MISC", "refsource" : "MISC",
"url" : "https://www.win-rar.com/whatsnew.html" "url" : "https://www.win-rar.com/whatsnew.html"
}, },
{
"name" : "https://research.checkpoint.com/extracting-code-execution-from-winrar/",
"refsource" : "MISC",
"url" : "https://research.checkpoint.com/extracting-code-execution-from-winrar/"
},
{ {
"name" : "106948", "name" : "106948",
"refsource" : "BID", "refsource" : "BID",

View File

@ -56,6 +56,11 @@
"name" : "https://www.win-rar.com/whatsnew.html", "name" : "https://www.win-rar.com/whatsnew.html",
"refsource" : "MISC", "refsource" : "MISC",
"url" : "https://www.win-rar.com/whatsnew.html" "url" : "https://www.win-rar.com/whatsnew.html"
},
{
"name" : "https://research.checkpoint.com/extracting-code-execution-from-winrar/",
"refsource" : "MISC",
"url" : "https://research.checkpoint.com/extracting-code-execution-from-winrar/"
} }
] ]
} }

View File

@ -0,0 +1,18 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2019-9823",
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}