WinRAR Flaw Let Hackers Run Programs When Opening RAR Files, Patch Issued

Venerable shareware archiving app WinRAR has recently been patched to fix an alarming flaw. The update to WinRAR version 6.23, spotted by Bleeping Computer, fixes the vulnerability to the high-severity CVE-2023-40477. In brief, earlier versions of WinRAR were vectors for running a program (arbitrary code execution) if an attacker could tempt the user to open a specially crafted RAR file.

If we look at the Zero Day Initiative’s description of the now-patched WinRAR flaw, it explains the following:

  • The vulnerability allowed remote attackers to execute arbitrary code,
  • The flaw was due to the program’s handling of recovery volumes,
  • The flaw stemmed from the application’s improper validation of user-supplied data,
  • This meant hackers could access memory beyond the end of an allocated buffer for their dastardly deeds, but…
  • Importantly, a user would have to visit a disguised malicious page or open a file to fall victim to hackers.

(Image credit: Zero Day Initiative)

Security researcher “goodbyeselene” is credited with discovering the WinRAR flaw described in CVE-2023-40477. They reported the vulnerability to WinRAR developers in early June. News of the flaw was published (August 17) several days after version 6.23 had become available for users to download (August 2), so that people had plenty of time to update.

Chia sẻ cho bạn bè cùng đọc