


WINRAR ARCHIVE
So we decided to drop ACE archive format support to protect security of WinRAR users.”įile-compression flaws have piqued the interest of exploit vendors such as Zerodium, who earlier last year offered up $10,000 for zero-day vulnerabilities in WinRAR and other compression platforms. unacev2.dll had not been updated since 2005 and we do not have access to its source code.
WINRAR UPDATE
On an update on its website, WinRAR said: “WinRAR used this third-party library to unpack ACE archives. 28, 5.70 beta 1.Ī WinRAR spokesperson told Threatpost: “We have removed support for the ACE file format from WinRAR in the new Beta version 5.70.” The PoC makes use of a chain of vulnerabilities (CVE-2018-20250, CVE-2018-20251, CVE-2018-20252, CVE-2018-20253).Īfter researchers informed WinRAR of the issue, the vulnerability was patched in a new version of the software on Jan. Heres a step by step tutorial of How you can create a password protected archive. Only personnel with password will be able to access files and folders inside password protected archive that you will create. Researchers specifically found a path-traversal vulnerability in unacev2.dll, a third-party dynamic link library in WinRAR used for parsing ACE (a data compression archive file format) archives.Ī path-traversal attack allows attackers to access directories that they should not be accessing, like config files or other files containing server data that is not intended for public. WinRAR provides ability to create password protected archives using WinRAR add password and block access to all those without password.
WINRAR ZIP FILE
WinRAR is a popular file-archiving utility for Windows, which can create and allow viewing of archives in Roshal Archive Compressed (RAR) or ZIP file formats, and unpack numerous archive file formats. This vulnerability has existed for over 19 years(!) and forced WinRAR to completely drop support for the vulnerable format.” “The exploit works by just extracting an archive, and puts over 500 million users at risk.
WINRAR FULL
“We found a logical bug using the WinAFL fuzzer and exploited it in WinRAR to gain full control over a victim’s computer,” said Nadav Grossman with Check Point in the analysis. The path-traversal vulnerability, which WinRAR fixed in January, could allow bad actors to remotely execute malicious code on victims’ machines – simply by persuading them to open a file, researchers with Check Point Software said on Wednesday. Another solution is to switch to 7zip.Popular Windows data compression tool WinRAR has patched a serious 19-year-old security flaw that was discovered on its platform, potentially impacting 500 million users. Any other version is vulnerable to these attacks. WinRAR users should ensure at once they are using version 5.70. People should be reflexively suspicious of any file offered for download online. They’re also being advertised on Twitter. Web searches such as this one show that an Ariana Grande RAR file with the same title identified by McAfee is currently circulating on BitTorrent download services.
WINRAR INSTALL
Schmugar didn’t say if all 100 exploits McAfee identified install the same malware. Once the computer was rebooted, it installed a generic trojan that, according to the Chronicle-owned VirusTotal service, was detected by just nine AV providers.

Under the hood, however, the RAR file also extracted a file titled “hi.exe” to the startup folder. Screenshots included in the post show that the malicious file extracts benign MP3 files to the target’s download folder. The next time the system restarts, the malware is run.” User Access Control (UAC) is bypassed, so no alert is displayed to the user. “When a vulnerable version of WinRAR is used to extract the contents of this archive, a malicious payload is created in the Startup folder behind the scenes. “One recent example piggybacks on a bootlegged copy of Ariana Grande’s hit album Thank U, Next with a file name of ‘Ariana_Grande-thank_u,_next(2019)_.rar,’” McAfee Research Architect Craig Schmugar wrote in the post.
