File-execution Vulnerability in WinRAR Affects Local Users
CVE-2015-5663
7.4HIGH
Summary
The file-execution feature in WinRAR versions prior to 5.30 beta 5 is susceptible to exploitation by local users. An attacker can design a Trojan horse file that mimics an extensionless filename, which may be inadvertently executed by a user. This vulnerability can lead to unauthorized privilege escalation, allowing the attacker to execute arbitrary commands with the user's permissions. Users are advised to update to the latest version to mitigate the risks associated with this vulnerability.
References
CVSS V3.1
Score:
7.4
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved