CVE-2019-25677
Received Received - Intake
Denial of Service in WinRAR 5.61 via Malformed Language File

Publication date: 2026-04-05

Last updated on: 2026-04-09

Assigner: VulnCheck

Description
WinRAR 5.61 contains a denial of service vulnerability that allows local attackers to crash the application by placing a malformed winrar.lng language file in the installation directory. Attackers can trigger the crash by opening an archive and pressing the test button, causing an access violation at memory address 004F1DB8 when the application attempts to read invalid data.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-05
Last Modified
2026-04-09
Generated
2026-05-06
AI Q&A
2026-04-06
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
rarlab winrar to 5.61 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-379 The product creates a temporary file in a directory whose permissions allow unintended actors to determine the file's existence or otherwise access that file.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in WinRAR version 5.61 and is a denial of service issue. It allows local attackers to crash the WinRAR application by placing a malformed winrar.lng language file in the installation directory.

When a user opens an archive and presses the test button, the application attempts to read invalid data from this malformed language file, causing an access violation at memory address 004F1DB8 and resulting in a crash.


How can this vulnerability impact me? :

This vulnerability can impact you by causing the WinRAR application to crash unexpectedly when opening archives and testing them if a maliciously crafted language file is present.

Since it is a denial of service vulnerability, it disrupts normal use of the application but does not compromise confidentiality or integrity of data.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves a malformed winrar.lng language file placed in the WinRAR installation directory that causes the application to crash when opening an archive and pressing the test button.

Detection would involve checking the WinRAR installation directory for suspicious or malformed winrar.lng files.

Since no specific commands or network detection methods are provided, a manual inspection of the installation directory is recommended.


What immediate steps should I take to mitigate this vulnerability?

The vulnerability allows local attackers to crash WinRAR by placing a malformed language file in the installation directory.

Immediate mitigation steps include ensuring that only trusted users have write access to the WinRAR installation directory to prevent placing malicious files.

Avoid opening archives and pressing the test button until a patch or update addressing this issue is applied.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart