RARLAB WinRAR before 7.00, on Linux and UNIX platforms, allows attackers to spoof the screen output, or cause a denial of service, via ANSI escape sequences.
References
| Link | Resource |
|---|---|
| https://sdushantha.medium.com/ansi-escape-injection-vulnerability-in-winrar-a2cbfac4b983 | Exploit Third Party Advisory |
| https://www.rarlab.com/rarnew.htm | Release Notes |
| https://sdushantha.medium.com/ansi-escape-injection-vulnerability-in-winrar-a2cbfac4b983 | Exploit Third Party Advisory |
| https://www.rarlab.com/rarnew.htm | Release Notes |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2024-04-29 00:15
Updated : 2025-06-20 17:38
NVD link : CVE-2024-33899
Mitre link : CVE-2024-33899
CVE.ORG link : CVE-2024-33899
JSON object : View
Products Affected
linux
- linux_kernel
opengroup
- unix
rarlab
- winrar
CWE
CWE-150
Improper Neutralization of Escape, Meta, or Control Sequences
