Post Now
Image

WinRAR has been found to contain a high-severity security flaw that a threat actor can exploit to execute remote code on Windows systems.

It has been described as a case of improper validation during the processing of recovery volumes. It has been tracked as CVE-2023-40477 (CVSS score: 7.8).

The issue results from the lack of proper validation of user-supplied data, which can result in memory access beyond the allocated buffer, according to the Zero Day Initiative (ZDI).

It is possible for an attacker to exploit this vulnerability to execute code within the context of the process.

Successful exploitation of the flaw requires user interaction—the target has to be lured into visiting a malicious site or opening a booby-trapped archive.

In August 2023, WinRAR 6.23 was released, which addresses the issue. The flaw was discovered and reported by a security researcher going by the alias goodbyeselene on 8 June 2023.

Security issues involving out-of-bounds writes have been resolved in RAR4 recovery volumes processing code, the software's maintainers announced.

Additionally, the latest version addresses another issue: WinRAR could start the wrong file after a user double-clicking an item in a specially crafted archive.Group-IB researcher Andrey Polovinkin reported the issue.

Want your digital assets to be protected? 

CyberShelter provides innovative and modern cybersecurity products and niche services to individuals and organization against all kinds of cyber threats.

For the latest cyber threats and the latest hacking news please follow us on FacebookLinkedin, and Twitter.

You may be interested in reading: How to Survive the COVID Time Cyber ​​Security Threats?