Description
RAR Password Recovery 1.80 contains a buffer overflow vulnerability that allows local attackers to crash the application by supplying an oversized payload in the registration dialog. Attackers can craft a malicious input string exceeding 6000 bytes and paste it into the User Name and Registration Code field to trigger an application crash.
Problem types
Product status
Credits
Achilles
References
www.exploit-db.com/exploits/47285 (ExploitDB-47285)
www.vulncheck.com/...overy-denial-of-service-buffer-overflow (VulnCheck Advisory: RAR Password Recovery 1.80 Denial of Service Buffer Overflow)