DescriptionInteger signedness error in the SET_VALUE function in rarvm.cpp in unrar 3.70 beta 3, as used in products including WinRAR and RAR for OS X, allows user-assisted remote attackers to cause a denial of service (crash) via a crafted RAR archive that causes a negative signed number to be cast to a large unsigned number.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub advisories/code/issues, web search, more)
Debian Bugs437703, 437704

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
rar (PTS)buster/non-free, bullseye/non-free2:5.5.0-1fixed
bookworm/non-free, sid/non-free2:6.20-0.1fixed
unrar-nonfree (PTS)buster/non-free1:5.6.6-1+deb10u1fixed
bookworm/non-free, sid/non-free1:6.2.6-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
rarsourceetch(not affected)


[etch] - unrar-nonfree <no-dsa> (Non-free not supported)
[sarge] - unrar-nonfree <no-dsa> (Non-free not supported)
[etch] - rar <not-affected> (Vulnerable code was fixed already)
[sarge] - rar <no-dsa> (Non-free not supported)

Search for package or bug name: Reporting problems