Home

Description

WinRAR 5.61 contains a denial of service vulnerability that allows local attackers to crash the application by placing a malformed winrar.lng language file in the installation directory. Attackers can trigger the crash by opening an archive and pressing the test button, causing an access violation at memory address 004F1DB8 when the application attempts to read invalid data.

PUBLISHED Reserved 2026-04-05 | Published 2026-04-05 | Updated 2026-04-06 | Assigner VulnCheck




MEDIUM: 6.9CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
MEDIUM: 6.2CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Problem types

Creation of Temporary File in Directory with Insecure Permissions

Product status

5.61 32 Bit
affected

Credits

Kağan Çapar finder

References

www.exploit-db.com/exploits/46432 (ExploitDB-46432) exploit

win-rar.com/...nload.html?spV=true&subD=true&f=wrar561tr.exe (Product Reference) product

www.vulncheck.com/...-of-service-via-malformed-language-file (VulnCheck Advisory: WinRAR 5.61 Denial of Service via Malformed Language File) third-party-advisory

cve.org (CVE-2019-25677)

nvd.nist.gov (CVE-2019-25677)

Download JSON