CVE-2007-0855

NameCVE-2007-0855
DescriptionStack-based buffer overflow in RARLabs Unrar, as packaged in WinRAR and possibly other products, allows user-assisted remote attackers to execute arbitrary code via a crafted, password-protected archive.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs410580, 410582

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
rar (PTS)jessie/non-free2:4.2.0+dfsg.1-0.1fixed
stretch/non-free2:6.23-1~deb9u1fixed
buster/non-free (security), buster/non-free2:6.23-1~deb10u1fixed
bullseye/non-free2:6.23-1~deb11u1fixed
bookworm/non-free2:6.23-1~deb12u1fixed
trixie/non-free2:7.01-1fixed
sid/non-free2:7.10~b1-1fixed
unrar-nonfree (PTS)jessie/non-free1:5.2.7-0.1+deb8u1fixed
stretch/non-free1:5.6.6-1+deb9u2fixed
buster/non-free (security), buster/non-free1:5.6.6-1+deb10u4fixed
bullseye/non-free1:6.0.3-1+deb11u3fixed
bookworm/non-free1:6.2.6-1+deb12u1fixed
trixie/non-free, sid/non-free1:7.1.1-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
rarsource(unstable)1:3.7b1-1high410582
unrar-nonfreesourcesarge1:3.5.2-0.2
unrar-nonfreesourceetch1:3.5.4-1.1
unrar-nonfreesource(unstable)1:3.7.3-1high410580

Notes

[sarge] - rar <no-dsa> (Non-free)
[etch] - rar <no-dsa> (Non-free)
amavid-new automatically uses "rar -p-" or "unrar -p-",
which probably turns this into remote code execution
clamav can also call unrar -p-, but AFAICS not in default configuration
unrar-free and clamav (which embeds unrar-free code) not affected

Search for package or bug name: Reporting problems