Impact
WinRAR 5.61 is vulnerable to a denial‑of‑service flaw that can be triggered by a local attacker who places a malformed winrar.lng language file in the installation directory. When the user opens an archive and clicks the Test button, the application attempts to read the corrupted file, causing an access violation at a hard‑coded memory address and forcing the program to crash. This behavior matches CWE‑379, which describes denial of service caused by unintended or erroneous behavior within the software.
Affected Systems
The issue affects the WinRAR 5.61 release from Rarlab. Users running this version will experience the crash if they encounter or place a corrupt winrar.lng file in the program’s install folder. No other product versions are listed as impacted in the available data.
Risk and Exploitability
The CVSS score of 6.9 reflects a moderate to high impact when the vulnerability is exploited, but the EPSS score of less than 1 percent indicates that exploitation is currently considered unlikely. Because the flaw requires local file‑system access to the WinRAR installation directory, the attack vector is inferred to be local rather than remote. The vulnerability is not currently catalogued by CISA’s KEV list. Overall, the risk is moderate, pending remediation.
OpenCVE Enrichment