Exploit Rar - CmdExtract::UnstoreFile Integer Truncation Memory Corruption

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
38930
Проверка EDB
  1. Пройдено
Автор
GOOGLE SECURITY RESEARCH
Тип уязвимости
DOS
Платформа
MULTIPLE
CVE
null
Дата публикации
2015-12-10
Rar - CmdExtract::UnstoreFile Integer Truncation Memory Corruption
Код:
Source: https://code.google.com/p/google-security-research/issues/detail?id=550

The attached file crashes in CmdExtract::UnstoreFile because the signed int64 DestUnpSize is truncated to an unsigned 32bit integer. Perhaps CmdExtract::ExtractCurrentFile should sanity check Arc.FileHead.UnpSize early.

I observed this crash in Avast Antivirus, but the origin of the code appears to be the unrar source distribution. I imagine many other antiviruses will be affected, and presumably WinRAR and other archivers.

Proof of Concept:
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38930.zip
 
Источник
www.exploit-db.com

Похожие темы