mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-08 05:58:08 +00:00
- Synchronized data.
This commit is contained in:
parent
3c92b6b82f
commit
dca6b7ba2e
@ -35,7 +35,7 @@
|
|||||||
"description_data" : [
|
"description_data" : [
|
||||||
{
|
{
|
||||||
"lang" : "eng",
|
"lang" : "eng",
|
||||||
"value" : "A validation function (in WinRAR code) is being called before extraction of ACE archives. The validation function inspects the filename field for each compressed file in the ACE archive. In case the filename is disallow by the validator function (for example, the filename contains path traversal patterns) The extraction operation should be aborted and no file or folder should be extracted. However, the check of the return value from the validator function made too late (in UNACEV2.dll), after the creation of files and folders. It prevent the write operation to the extracted files only."
|
"value" : "In WinRAR versions prior to and including 5.61, there is path traversal vulnerability when crafting the filename field of the ACE format. The UNACE module (UNACEV2.dll) creates files and folders as written in the filename field even when WinRAR validator noticed the traversal attempt and requestd to abort the extraction process. the operation is cancelled only after the folders and files were created but prior to them being written, therefore allowing the attacker to create empty files and folders everywhere in the file system."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -58,6 +58,11 @@
|
|||||||
"refsource" : "MISC",
|
"refsource" : "MISC",
|
||||||
"url" : "https://www.win-rar.com/whatsnew.html"
|
"url" : "https://www.win-rar.com/whatsnew.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name" : "https://research.checkpoint.com/extracting-code-execution-from-winrar/",
|
||||||
|
"refsource" : "MISC",
|
||||||
|
"url" : "https://research.checkpoint.com/extracting-code-execution-from-winrar/"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name" : "106948",
|
"name" : "106948",
|
||||||
"refsource" : "BID",
|
"refsource" : "BID",
|
||||||
|
@ -35,7 +35,7 @@
|
|||||||
"description_data" : [
|
"description_data" : [
|
||||||
{
|
{
|
||||||
"lang" : "eng",
|
"lang" : "eng",
|
||||||
"value" : "There is an out-of-bounds writes vulnerability during parsing of crafted ACE and RAR archive formats. Successful exploitation could lead to arbitrary code execution in the context of the current user."
|
"value" : "In WinRAR versions prior to and including 5.60, there is an out-of-bounds write vulnerability during parsing of crafted ACE and RAR archive formats. Successful exploitation could lead to arbitrary code execution in the context of the current user."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -58,6 +58,11 @@
|
|||||||
"refsource" : "MISC",
|
"refsource" : "MISC",
|
||||||
"url" : "https://www.win-rar.com/whatsnew.html"
|
"url" : "https://www.win-rar.com/whatsnew.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"name" : "https://research.checkpoint.com/extracting-code-execution-from-winrar/",
|
||||||
|
"refsource" : "MISC",
|
||||||
|
"url" : "https://research.checkpoint.com/extracting-code-execution-from-winrar/"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"name" : "106948",
|
"name" : "106948",
|
||||||
"refsource" : "BID",
|
"refsource" : "BID",
|
||||||
|
@ -56,6 +56,11 @@
|
|||||||
"name" : "https://www.win-rar.com/whatsnew.html",
|
"name" : "https://www.win-rar.com/whatsnew.html",
|
||||||
"refsource" : "MISC",
|
"refsource" : "MISC",
|
||||||
"url" : "https://www.win-rar.com/whatsnew.html"
|
"url" : "https://www.win-rar.com/whatsnew.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name" : "https://research.checkpoint.com/extracting-code-execution-from-winrar/",
|
||||||
|
"refsource" : "MISC",
|
||||||
|
"url" : "https://research.checkpoint.com/extracting-code-execution-from-winrar/"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
18
2019/9xxx/CVE-2019-9823.json
Normal file
18
2019/9xxx/CVE-2019-9823.json
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
{
|
||||||
|
"CVE_data_meta" : {
|
||||||
|
"ASSIGNER" : "cve@mitre.org",
|
||||||
|
"ID" : "CVE-2019-9823",
|
||||||
|
"STATE" : "RESERVED"
|
||||||
|
},
|
||||||
|
"data_format" : "MITRE",
|
||||||
|
"data_type" : "CVE",
|
||||||
|
"data_version" : "4.0",
|
||||||
|
"description" : {
|
||||||
|
"description_data" : [
|
||||||
|
{
|
||||||
|
"lang" : "eng",
|
||||||
|
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
Loading…
x
Reference in New Issue
Block a user