CVE-2024-33899

RARLAB WinRAR before 7.00, on Linux and UNIX platforms, allows attackers to spoof the screen output, or cause a denial of service, via ANSI escape sequences.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:rarlab:winrar:*:*:*:*:*:*:*:*
OR cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:opengroup:unix:-:*:*:*:*:*:*:*

History

20 Jun 2025, 17:38

Type Values Removed Values Added
CPE cpe:2.3:a:rarlab:winrar:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:opengroup:unix:-:*:*:*:*:*:*:*
First Time Linux
Opengroup
Rarlab winrar
Linux linux Kernel
Rarlab
Opengroup unix
References () https://sdushantha.medium.com/ansi-escape-injection-vulnerability-in-winrar-a2cbfac4b983 - () https://sdushantha.medium.com/ansi-escape-injection-vulnerability-in-winrar-a2cbfac4b983 - Exploit, Third Party Advisory
References () https://www.rarlab.com/rarnew.htm - () https://www.rarlab.com/rarnew.htm - Release Notes

Information

Published : 2024-04-29 00:15

Updated : 2025-06-20 17:38


NVD link : CVE-2024-33899

Mitre link : CVE-2024-33899

CVE.ORG link : CVE-2024-33899


JSON object : View

Products Affected

opengroup

  • unix

rarlab

  • winrar

linux

  • linux_kernel
CWE
CWE-150

Improper Neutralization of Escape, Meta, or Control Sequences