CVE-2019-25677

WinRAR 5.61 contains a denial of service vulnerability that allows local attackers to crash the application by placing a malformed winrar.lng language file in the installation directory. Attackers can trigger the crash by opening an archive and pressing the test button, causing an access violation at memory address 004F1DB8 when the application attempts to read invalid data.
Configurations

Configuration 1 (hide)

cpe:2.3:a:rarlab:winrar:*:*:*:*:*:*:x86:*

History

09 Apr 2026, 19:35

Type Values Removed Values Added
First Time Rarlab
Rarlab winrar
CPE cpe:2.3:a:rarlab:winrar:*:*:*:*:*:*:x86:*
References () https://win-rar.com/predownload.html?spV=true&subD=true&f=wrar561tr.exe - () https://win-rar.com/predownload.html?spV=true&subD=true&f=wrar561tr.exe - Product
References () https://www.exploit-db.com/exploits/46432 - () https://www.exploit-db.com/exploits/46432 - Exploit, VDB Entry
References () https://www.vulncheck.com/advisories/winrar-denial-of-service-via-malformed-language-file - () https://www.vulncheck.com/advisories/winrar-denial-of-service-via-malformed-language-file - Third Party Advisory

05 Apr 2026, 21:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-05 21:16

Updated : 2026-04-09 19:35


NVD link : CVE-2019-25677

Mitre link : CVE-2019-25677

CVE.ORG link : CVE-2019-25677


JSON object : View

Products Affected

rarlab

  • winrar
CWE
CWE-379

Creation of Temporary File in Directory with Insecure Permissions