UnRAR 5.6.1.2 and 5.6.1.3 has a heap-based buffer overflow in Unpack::CopyString (called from Unpack::Unpack5 and CmdExtract::ExtractCurrentFile).
                
            References
                    | Link | Resource | 
|---|---|
| https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=4373 | Exploit Issue Tracking Patch Third Party Advisory | 
| https://github.com/aawc/unrar/commit/0ff832d31470471803b175cfff4e40c1b08ee779 | Patch Third Party Advisory | 
| https://github.com/google/oss-fuzz-vulns/blob/main/vulns/unrar/OSV-2017-104.yaml | Third Party Advisory | 
| https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=4373 | Exploit Issue Tracking Patch Third Party Advisory | 
| https://github.com/aawc/unrar/commit/0ff832d31470471803b175cfff4e40c1b08ee779 | Patch Third Party Advisory | 
| https://github.com/google/oss-fuzz-vulns/blob/main/vulns/unrar/OSV-2017-104.yaml | Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
| AND | 
            
            
 
  | 
    
History
                    21 Nov 2024, 03:22
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=4373 - Exploit, Issue Tracking, Patch, Third Party Advisory | |
| References | () https://github.com/aawc/unrar/commit/0ff832d31470471803b175cfff4e40c1b08ee779 - Patch, Third Party Advisory | |
| References | () https://github.com/google/oss-fuzz-vulns/blob/main/vulns/unrar/OSV-2017-104.yaml - Third Party Advisory | 
Information
                Published : 2021-07-01 03:15
Updated : 2024-11-21 03:22
NVD link : CVE-2017-20006
Mitre link : CVE-2017-20006
CVE.ORG link : CVE-2017-20006
JSON object : View
Products Affected
                linux
- linux_kernel
 
rarlab
- unrar
 
CWE
                
                    
                        
                        CWE-787
                        
            Out-of-bounds Write
