CVE-2007-0855 Affecting rar package, versions <1:3.7b1-1
Threat Intelligence
EPSS
8.55% (95th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN9-RAR-307365
- published 8 Feb 2007
- disclosed 8 Feb 2007
Introduced: 8 Feb 2007
CVE-2007-0855 Open this link in a new tabHow to fix?
Upgrade Debian:9 rar to version 1:3.7b1-1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream rar package and not the rar package as distributed by Debian.
See How to fix? for Debian:9 relevant fixed versions and status.
Stack-based buffer overflow in RARLabs Unrar, as packaged in WinRAR and possibly other products, allows user-assisted remote attackers to execute arbitrary code via a crafted, password-protected archive.
References
- https://security-tracker.debian.org/tracker/CVE-2007-0855
- http://security.gentoo.org/glsa/glsa-200702-04.xml
- http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=472
- http://osvdb.org/33124
- http://securitytracker.com/id?1017593
- http://www.novell.com/linux/security/advisories/2007_5_sr.html
- http://www.vupen.com/english/advisories/2007/0523
- http://secunia.com/advisories/24077
- http://secunia.com/advisories/24165
- http://www.securityfocus.com/bid/22447
- https://exchange.xforce.ibmcloud.com/vulnerabilities/32357
CVSS Scores
version 3.1