WinRAR 5.61 contains a denial of service vulnerability that allows local attackers to crash the application by placing a malformed winrar.lng language file in the installation directory. Attackers can trigger the crash by opening an archive and pressing the test button, causing an access violation at memory address 004F1DB8 when the application attempts to read invalid data.
References
| Link | Resource |
|---|---|
| https://win-rar.com/predownload.html?spV=true&subD=true&f=wrar561tr.exe | Product |
| https://www.exploit-db.com/exploits/46432 | Exploit VDB Entry |
| https://www.vulncheck.com/advisories/winrar-denial-of-service-via-malformed-language-file | Third Party Advisory |
Configurations
History
09 Apr 2026, 19:35
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Rarlab
Rarlab winrar |
|
| CPE | cpe:2.3:a:rarlab:winrar:*:*:*:*:*:*:x86:* | |
| References | () https://win-rar.com/predownload.html?spV=true&subD=true&f=wrar561tr.exe - Product | |
| References | () https://www.exploit-db.com/exploits/46432 - Exploit, VDB Entry | |
| References | () https://www.vulncheck.com/advisories/winrar-denial-of-service-via-malformed-language-file - Third Party Advisory |
05 Apr 2026, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-05 21:16
Updated : 2026-04-09 19:35
NVD link : CVE-2019-25677
Mitre link : CVE-2019-25677
CVE.ORG link : CVE-2019-25677
JSON object : View
Products Affected
rarlab
- winrar
CWE
CWE-379
Creation of Temporary File in Directory with Insecure Permissions
