Jump to content
xzsdyx

Extracting a 19 Year Old Code Execution from WinRAR

Recommended Posts

Quote

Introduction

In this article, we tell the story of how we found a logical bug using the WinAFL fuzzer and exploited it in WinRAR to gain full control over a victim’s computer. The exploit works by just extracting an archive, and puts over 500 million users at risk. This vulnerability has existed for over 19 years(!) and forced WinRAR to completely drop support for the vulnerable format.

 

link: https://research.checkpoint.com/extracting-code-execution-from-winrar/

  • Upvote 1
Link to comment
Share on other sites

WinRar Version 5.70 beta 1 - removed old ACE format support.


  21. Nadav Grossman from Check Point Software Technologies informed us
      about a security vulnerability in UNACEV2.DLL library.
      Aforementioned vulnerability makes possible to create files
      in arbitrary folders inside or outside of destination folder
      when unpacking ACE archives.

      WinRAR used this third party library to unpack ACE archives.
      UNACEV2.DLL had not been updated since 2005 and we do not have access
      to its source code. So we decided to drop ACE archive format support
      to protect security of WinRAR users.

      We are thankful to Check Point Software Technologies for reporting
      this issue.

Edited by old66
Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...