Shortly after that, TAG began to observe testing activity from both financially motivated and APT actors experimenting with CVE-2023-38831.Ĭonsider the following archive structure: Hours after the blog post was released, proof of concepts and exploit generators were uploaded to public GitHub repositories. The vulnerability allows attackers to execute arbitrary code when a user attempts to view a benign file (such as an ordinary PNG file) within a ZIP archive.Īs detailed in a blog post from Group-IB, the vulnerability had been exploited as 0-day by cybercrime actors in-the-wild since at least April 2023 for campaigns targeting financial traders to deliver various commodity malware families. One of those bugs, later assigned CVE-2023-38831, is a logical vulnerability within WinRAR causing extraneous temporary file expansion when processing crafted archives, combined with a quirk in the implementation of Windows’ ShellExecute when attempting to open a file with an extension containing spaces. RAR for Android 6.In August 2023, RARLabs released an updated version of WinRAR that included fixes for several security-related bugs. Latest English WinRAR and RAR beta versions If you prefer not to have cookies stored within your web-browser, please adjust your browser settings accordingly. For more detailed information regarding the use of cookies on this website, please see our "Privacy Policy". By using this website, you consent to the use of cookies. Our website uses cookies to help improve your visit. We want you to have the best possible experience while using our service.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |