CVE-2019-25677
Denial of Service in WinRAR 5.61 via Malformed Language File
Publication date: 2026-04-05
Last updated on: 2026-04-09
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| rarlab | winrar | to 5.61 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-379 | The product creates a temporary file in a directory whose permissions allow unintended actors to determine the file's existence or otherwise access that file. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in WinRAR version 5.61 and is a denial of service issue. It allows local attackers to crash the WinRAR application by placing a malformed winrar.lng language file in the installation directory.
When a user opens an archive and presses the test button, the application attempts to read invalid data from this malformed language file, causing an access violation at memory address 004F1DB8 and resulting in a crash.
How can this vulnerability impact me? :
This vulnerability can impact you by causing the WinRAR application to crash unexpectedly when opening archives and testing them if a maliciously crafted language file is present.
Since it is a denial of service vulnerability, it disrupts normal use of the application but does not compromise confidentiality or integrity of data.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability involves a malformed winrar.lng language file placed in the WinRAR installation directory that causes the application to crash when opening an archive and pressing the test button.
Detection would involve checking the WinRAR installation directory for suspicious or malformed winrar.lng files.
Since no specific commands or network detection methods are provided, a manual inspection of the installation directory is recommended.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability allows local attackers to crash WinRAR by placing a malformed language file in the installation directory.
Immediate mitigation steps include ensuring that only trusted users have write access to the WinRAR installation directory to prevent placing malicious files.
Avoid opening archives and pressing the test button until a patch or update addressing this issue is applied.