RARLAB WinRAR Recovery Volume Improper Validation of Array Index Remote Code Execution Vulnerability
CVE-2023-40477
Key Information:
Badges
Summary
A vulnerability has been identified in RARLAB WinRAR concerning the improper validation of array indices within recovery volume processing. This issue can be exploited by remote attackers who could execute arbitrary code on systems running affected versions of WinRAR. The flaw arises from insufficient validation of user-supplied data, leading to potential memory access beyond allocated buffers. Attackers can exploit this vulnerability when users visit a malicious website or open a crafted archive. Users of WinRAR are advised to be cautious and avoid opening untrusted files or links.
Affected Version(s)
WinRAR 6.21
News Articles
Fake WinRAR PoC spread VenomRAT malware - Help Net Security
An threat actor has released a fake PoC exploit for a recently fixed RCE vulnerability in WinRAR to spread the VenomRAT malware.
WinRAR vulnerable to remote code execution, patch now! (CVE-2023-40477) - Help Net Security
RARLAB has fixed a high-severity RCE vulnerability (CVE-2023-40477) in WinRAR, a widely used file archiver for Windows.
References
EPSS Score
93% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
Vulnerability published
- 💰
Used in Ransomware
- 👾
Exploit known to exist
- 📰
First article discovered by Help Net Security
Vulnerability Reserved