CVE-2017-14122
Published: 3 September 2017
unrar 0.0.1 (aka unrar-free or unrar-gpl) suffers from a stack-based buffer over-read in unrarlib.c, related to ExtrFile and stricomp.
From the Ubuntu Security Team
It was discovered that UnRAR mishandled specially crafted RAR archive. An attacker could use this vulnerability to cause a denial of service (crash) or possibly leak sensitive information.
Priority
Status
Package | Release | Status |
---|---|---|
unrar-free Launchpad, Ubuntu, Debian |
artful |
Ignored
(end of life)
|
bionic |
Not vulnerable
(1:0.0.1+cvs20140707-4)
|
|
cosmic |
Not vulnerable
(1:0.0.1+cvs20140707-4)
|
|
disco |
Not vulnerable
(1:0.0.1+cvs20140707-4)
|
|
trusty |
Released
(1:0.0.1+cvs20071127-2+deb7u1ubuntu0.1~esm1)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only) |
|
upstream |
Released
(1:0.0.1+cvs20140707-4)
|
|
xenial |
Released
(1:0.0.1+cvs20140707-4~build0.16.04.1)
|
|
zesty |
Ignored
(end of life)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 9.1 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H |