DescriptionInteger signedness error in the SET_VALUE function in rarvm.cpp in unrar 3.70 beta 3, as used in products including WinRAR and RAR for OS X, allows user-assisted remote attackers to cause a denial of service (crash) via a crafted RAR archive that causes a negative signed number to be cast to a large unsigned number.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs437703, 437704

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
rar (PTS)bullseye/non-free2:6.23-1~deb11u1fixed
trixie/non-free, sid/non-free2:7.00-1fixed
unrar-nonfree (PTS)bullseye/non-free1:6.0.3-1+deb11u3fixed
trixie/non-free, sid/non-free1:7.0.9-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
rarsourceetch(not affected)


[etch] - unrar-nonfree <no-dsa> (Non-free not supported)
[sarge] - unrar-nonfree <no-dsa> (Non-free not supported)
[etch] - rar <not-affected> (Vulnerable code was fixed already)
[sarge] - rar <no-dsa> (Non-free not supported)

Search for package or bug name: Reporting problems