WinRAR Text Vulnerability - 20240524001¶
Overview¶
RARLAB WinRAR the popular file compression software, could be exploited to deceive users or even cause system crashes. The vulnerability, which affects the console versions of RAR and UnRAR, for Linux and Unix systems and for Windows systems. This vulnerability could allow attackers to inject ANSI escape sequences, has been patched in version 7.00. The GUI version of WinRAR and the UnRAR library were not impacted at the time of publication.
What is vulnerable?¶
CVE | Severity | CVSS | Product(s) Affected | Summary | Dated |
---|---|---|---|---|---|
CVE-2024-33899 | Critical | 9.1 | versions before 7.00, on Linux and UNIX platforms | allows attackers to spoof the screen output, or cause a denial of service, via ANSI escape sequences. | 21 May, 2024 |
CVE-2024-30652 | High | 7.5 | versions before 7.00, on Linux and UNIX platforms | allows attackers to spoof the screen output via ANSI escape sequences, a different issue than CVE-2024-33899. | 22 May, 2024 |
What has been observed?¶
There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing.
Recommendation¶
The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of one month... (refer Patch Management):