Language:
https://research.checkpoint.com/extracting-code-execution-from-winrar/
Severity: High
ID: 122448
File Name: winrar_5_70_beta_1.nasl
Version: 1.11
Type: local
Agent: windows
Family: Windows
Published: 2/27/2019
Updated: 8/24/2023
Configuration: Enable thorough checks
Supported Sensors: Nessus Agent, Nessus
Risk Factor: Critical
Score: 9.8
Risk Factor: Medium
Base Score: 6.8
Temporal Score: 5.9
Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS Score Source: CVE-2018-20253
Risk Factor: High
Base Score: 7.8
Temporal Score: 7.5
Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C
CPE: cpe:/a:rarlab:winrar
Required KB Items: installed_sw/RARLAB WinRAR, SMB/Registry/Enumerated
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 2/20/2019
Vulnerability Publication Date: 2/20/2019
CISA Known Exploited Vulnerability Due Dates: 8/15/2022
Core Impact
Metasploit (RARLAB WinRAR ACE Format Input Validation Remote Code Execution)
CVE: CVE-2018-20250, CVE-2018-20251, CVE-2018-20252, CVE-2018-20253
BID: 106948
IAVA: 2020-A-0007-S