CVE-2012-6706
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
A VMSF_DELTA memory corruption was discovered in unrar before 5.5.5, as used in Sophos Anti-Virus Threat Detection Engine before 3.37.2 and other products, that can lead to arbitrary code execution. An integer overflow can be caused in DataSize+CurChannel. The result is a negative value of the "DestPos" variable, which allows the attacker to write out of bounds when setting Mem[DestPos].
Una corrupción de memoria VMSF_DELTA descubierta en unrar versiones anteriores a 5.5.5, utilizada en Sophos Anti-Virus Threat Detection Engine versiones anteriores a 3.37.2 y otros productos, puede permitir la ejecución de código arbitrario. Un desbordamiento de enteros puede producirse en DataSize + CurChannel. El resultado es un valor negativo de la variable "DestPos", que permite al atacante escribir fuera de límites al configurar Mem [DestPos].
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-06-22 CVE Reserved
- 2017-06-22 CVE Published
- 2024-08-06 CVE Updated
- 2024-08-06 First Exploit
- 2024-08-14 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-190: Integer Overflow or Wraparound
CAPEC
References (10)
URL | Tag | Source |
---|---|---|
http://securitytracker.com/id?1027725 | Third Party Advisory | |
http://telussecuritylabs.com/threats/show/TSL20121207-01 | Third Party Advisory | |
https://kc.mcafee.com/corporate/index?page=content&id=SB10205 | X_refsource_confirm | |
https://lock.cmpxchg8b.com/sophailv2.pdf | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://bugs.chromium.org/p/project-zero/issues/detail?id=1286 | 2024-08-06 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://community.sophos.com/kb/en-us/118424#six | 2018-10-21 | |
https://nakedsecurity.sophos.com/2012/11/05/tavis-ormandy-sophos | 2018-10-21 | |
https://security.gentoo.org/glsa/201708-05 | 2018-10-21 | |
https://security.gentoo.org/glsa/201709-24 | 2018-10-21 | |
https://security.gentoo.org/glsa/201804-16 | 2018-10-21 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Sophos Search vendor "Sophos" | Threat Detection Engine Search vendor "Sophos" for product "Threat Detection Engine" | <= 3.36.2 Search vendor "Sophos" for product "Threat Detection Engine" and version " <= 3.36.2" | - |
Affected
| ||||||
Rarlab Search vendor "Rarlab" | Unrar Search vendor "Rarlab" for product "Unrar" | <= 5.5.4 Search vendor "Rarlab" for product "Unrar" and version " <= 5.5.4" | - |
Affected
|