CVE-2007-3726

NameCVE-2007-3726
DescriptionInteger signedness error in the SET_VALUE function in rarvm.cpp in unrar 3.70 beta 3, as used in products including WinRAR and RAR for OS X, allows user-assisted remote attackers to cause a denial of service (crash) via a crafted RAR archive that causes a negative signed number to be cast to a large unsigned number.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium (attack range: remote)
Debian Bugs437703, 437704

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
rar (PTS)jessie/non-free2:4.2.0+dfsg.1-0.1fixed
stretch/non-free2:5.4.0+dfsg.1-0.1fixed
buster/non-free, sid/non-free2:5.5.0-1fixed
unrar-nonfree (PTS)jessie/non-free1:5.2.7-0.1+deb8u1fixed
stretch/non-free1:5.3.2-1+deb9u1fixed
buster/non-free, sid/non-free1:5.5.8-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
rarsource(unstable)1:3.7b1-1low437704
rarsourceetch(not affected)
unrar-nonfreesource(unstable)3.7.3-1.1low437703

Notes

[etch] - unrar-nonfree <no-dsa> (Non-free not supported)
[sarge] - unrar-nonfree <no-dsa> (Non-free not supported)
[etch] - rar <not-affected> (Vulnerable code was fixed already)
[sarge] - rar <no-dsa> (Non-free not supported)

Search for package or bug name: Reporting problems