Skip to content

WinRAR Text Vulnerability - 20240524001

Overview

RARLAB WinRAR the popular file compression software, could be exploited to deceive users or even cause system crashes. The vulnerability, which affects the console versions of RAR and UnRAR, for Linux and Unix systems and for Windows systems. This vulnerability could allow attackers to inject ANSI escape sequences, has been patched in version 7.00. The GUI version of WinRAR and the UnRAR library were not impacted at the time of publication.

What is vulnerable?

CVE Severity CVSS Product(s) Affected Summary Dated
CVE-2024-33899 Critical 9.1 versions before 7.00, on Linux and UNIX platforms allows attackers to spoof the screen output, or cause a denial of service, via ANSI escape sequences. 21 May, 2024
CVE-2024-30652 High 7.5 versions before 7.00, on Linux and UNIX platforms allows attackers to spoof the screen output via ANSI escape sequences, a different issue than CVE-2024-33899. 22 May, 2024

What has been observed?

There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing.

Recommendation

The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of one month... (refer Patch Management):

Additional References