FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

rar -- password prompt buffer overflow vulnerability

Affected packages
rar < 3.70.b1,1
unrar < 3.70.b1,4
zh-unrar < 3.70.b1,4

Details

VuXML ID 94234e00-be8a-11db-b2ec-000c6ec775d9
Discovery 2007-02-07
Entry 2007-02-17

iDefense reports:

Remote exploitation of a stack based buffer overflow vulnerability in RARLabs Unrar may allow an attacker to execute arbitrary code with the privileges of the user opening the archive.

Unrar is prone to a stack based buffer overflow when processing specially crafted password protected archives.

If users are using the vulnerable command line based unrar, they still need to interact with the program in order to trigger the vulnerability. They must respond to the prompt asking for the password, after which the vulnerability will be triggered. They do not need to enter a correct password, but they must at least push the enter key.

References

Bugtraq ID 22447
CVE Name CVE-2007-0855
URL http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=472
URL http://www.rarsoft.com/rarnew.htm