Description
WinRAR 5.61 contains a denial of service vulnerability that allows local attackers to crash the application by placing a malformed winrar.lng language file in the installation directory. Attackers can trigger the crash by opening an archive and pressing the test button, causing an access violation at memory address 004F1DB8 when the application attempts to read invalid data.
Problem types
Creation of Temporary File in Directory with Insecure Permissions
Product status
Credits
Kağan Çapar
References
www.exploit-db.com/exploits/46432 (ExploitDB-46432)
win-rar.com/...nload.html?spV=true&subD=true&f=wrar561tr.exe (Product Reference)
www.vulncheck.com/...-of-service-via-malformed-language-file (VulnCheck Advisory: WinRAR 5.61 Denial of Service via Malformed Language File)