Posted September 30, 201510 yr WinRAR Vulnerability This vulnerability, which as of now has not received a CVE ID yet, allows a remote attacker to create a compressed file and execute code on the victim’s computer when they are processing to open the infected compressed SFX archive. Basically, the attack uses the option to write HTML code in the text display window when creating a SFX archive. https://blog.malwarebytes.org/security-threat/2015/09/latest-winrar-vulnerability-has-yet-to-be-patched/ Ted.
September 30, 201510 yr From comments of the article: this "issue" is basically "code execution can cause code execution"+1 to the author of the comment.
September 30, 201510 yr I personally think its not a big thing, since you can infected any .exe if you have access to it. So why bother with perl code doing shit.
October 3, 201510 yr Author A response from the developers on this issue... http://www.rarlab.com/vuln_sfx_html.htmhttp://www.rarlab.com/vuln_sfx_html2.htm Ted.
October 3, 201510 yr +1 for the finding of the vuln-1 for the impact net value: 0 fu.ck$ given. Edited October 3, 201510 yr by xSRTsect
October 7, 201510 yr Author REDACTION: WinRAR Vulnerability Looks like Malwarebytes found themselves on the naughty boys list... https://blog.malwarebytes.org/news/2015/10/redaction-winrar-vulnerability/ Ted.
October 8, 201510 yr Was a stupid one anyway. By run an exe, it might run code which is malicious..... shocker!
Create an account or sign in to comment