A high-severity security flaw has been disclosed in the WinRAR utility that could be perhaps exploited by a risk actor to realize remote code execution on Windows methods.
Tracked as CVE-2023-40477 (CVSS score: 7.8), the vulnerability has been described as a situation of incorrect validation when processing recovery volumes.
“The issue outcomes from the absence of appropriate validation of user-equipped data, which can final result in a memory entry earlier the end of an allotted buffer,” the Zero Day Initiative (ZDI) reported in an advisory.
“An attacker can leverage this vulnerability to execute code in the context of the existing approach.”
Profitable exploitation of the flaw calls for consumer interaction in that the target have to be lured into visiting a destructive site or by simply just opening a booby-trapped archive file.
A security researcher, who goes by the alias goodbyeselene, has been credited with discovering and reporting the flaw on June 8, 2023. The issue has been addressed in WinRAR 6.23 released on August 2, 2023.
“A security issue involving out of bounds publish is fixed in RAR4 restoration volumes processing code,” the maintainers of the computer software reported.
The hottest variation also addresses a 2nd issue wherein “WinRAR could start off a completely wrong file just after a user double clicked an merchandise in a specially crafted archive.” Group-IB researcher Andrey Polovinkin has been credited for reporting the challenge.
People are proposed to update to the most current version to mitigate opportunity threats.
Discovered this post exciting? Observe us on Twitter and LinkedIn to go through much more unique content material we article.
Some parts of this article are sourced from:
thehackernews.com