Up to 500 million exposed by WinRAR remote code execution vulnerability

By

Creator plays down risk.

A researcher has found a way to exploit popular archival utility WinRAR to remotely execute malicious code on users' computers, without any interaction being required.

Up to 500 million exposed by WinRAR remote code execution vulnerability

Iranian researcher Mohammad Reza Espargham found that it was possible to use WinRAR SFX 2.51 to add malicious payloads that would execute when users decompress archives.

A specially crafted hyper text mark-up language (HTML) text file that is parsed and which attempts to download and run potentially malicious code can be included in WinRAR SFX archives, Espargham noted.

The researcher suggested secure parsing of the text file, and encoding of the URL value parameter in the outgoing module HTTP GET request, as ways to protect against the flaw.

Espargham gave the flaw a common vulnerabilities scoring system rating of 9.2, with 10 being the highest. WinRAR has around 500 million users worldwide.

WinRAR developer RARlab confirmed that it is possible to create SFX archives with a specially crafted HTML file that can download and execute malicious code on users computers, but insisted that this is not a flaw or vulnerability in the application.

"Executable files are potentially dangerous by design. Run them only if they are received from a trustworthy source.

"WinRAR self-extracting (SFX) archives are not less or more dangerous than other .exe files," the company argued.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:

Most Read Articles

NSW Police to embark on $126m IT overhaul

NSW Police to embark on $126m IT overhaul

CBA looks to GenAI to assist 1200 'security champions'

CBA looks to GenAI to assist 1200 'security champions'

Australia's super funds told to assess authentication controls

Australia's super funds told to assess authentication controls

WestJet probes cyber security incident

WestJet probes cyber security incident

Log In

  |  Forgot your password?