WinRAR < 7.00 Multiple Vulnerabilities

medium Nessus Plugin ID 192940

Synopsis

The remote Windows host has an application installed which is affected by multiple vulnerabilities.

Description

The remote host is running WinRAR, an archive manager for Windows, whose reported version is prior to 7.00. It is, therefore, affected by multiple vulnerabilties:

- The vulnerability exists due to an error within the archive extraction functionality. A remote attacker can use a specially crafted archive to bypass the Mark-Of-The-Web protection mechanism and potentially compromise the affected system. (CVE-2024-30370)

- RARLAB WinRAR before 7.00, on Windows, allows attackers to spoof the screen output via ANSI escape sequences, a different issue than CVE-2024-33899. (CVE-2024-36052)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to WinRAR version 7.00 or later.

See Also

https://www.zerodayinitiative.com/advisories/ZDI-24-357/

https://www.rarlab.com/rarnew.htm

http://www.nessus.org/u?64afd272

Plugin Details

Severity: Medium

ID: 192940

File Name: winrar_700.nasl

Version: 1.4

Type: local

Agent: windows

Family: Windows

Published: 4/5/2024

Updated: 5/24/2024

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

CVSS Score Source: CVE-2024-30370

CVSS v3

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:rarlab:winrar

Required KB Items: SMB/Registry/Enumerated, installed_sw/RARLAB WinRAR

Exploit Ease: No known exploits are available

Patch Publication Date: 4/1/2024

Vulnerability Publication Date: 4/1/2024

Reference Information

CVE: CVE-2024-30370, CVE-2024-36052

IAVA: 2024-A-0194-S, 2024-A-0303