Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Up to 500 million exposed by WinRAR remote code execution vulnerability
iTnews.com (AUS) ^ | Oct 1 2015 6:35AM (AUS) | Juha Saarinen

Posted on 10/02/2015 4:22:09 PM PDT by Utilizer

... A researcher has found a way to exploit popular archival utility WinRAR to remotely execute malicious code on users' computers, without any interaction being required.

Iranian researcher Mohammad Reza Espargham found that it was possible to use WinRAR SFX 2.51 to add malicious payloads that would execute when users decompress archives.

A specially crafted hyper text mark-up language (HTML) text file that is parsed and which attempts to download and run potentially malicious code can be included in WinRAR SFX archives, Espargham noted.

The researcher suggested secure parsing of the text file, and encoding of the URL value parameter in the outgoing module HTTP GET request, as ways to protect against the flaw.

(Excerpt) Read more at itnews.com.au ...


TOPICS: Computers/Internet
KEYWORDS: 7zip; archive; compression; filecompress; microsoft; windows; windowspinglist; winrar; zip
I use p7zip, actually, since it has better compression and more configuration options but I believe there are still some WinRAR users out there.
1 posted on 10/02/2015 4:22:11 PM PDT by Utilizer
[ Post Reply | Private Reply | View Replies]

To: dayglored

Ping...


2 posted on 10/02/2015 4:28:54 PM PDT by Utilizer (Bacon A'kbar! - In world today are only peaceful people, and the muzlims trying to kill them)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Utilizer

Winrar uses are behind the eight ball. 7zip or homegrown C code is the only way.


3 posted on 10/02/2015 4:49:48 PM PDT by soycd
[ Post Reply | Private Reply | To 1 | View Replies]

To: Utilizer

I quit using WinRAR sometime during the last century, I believe.

7zip is the only way to go.

btw, ANY SFX facility that lets you roll your own executable, including 7zsfx, can include malicious content, given that these bundles can contain any kind and amount of various executable codes, so this article contains no real news, and the issue is not specific to he WinRAR SFX.

Here’s a tip for everyone: on Windows, if a file ends in .exe, assume it will destroy your computer unless you are absolute certain that the source is 100% legitimate.


4 posted on 10/02/2015 4:51:06 PM PDT by catnipman (Cat Nipman: Vote Republican in 2012 and only be called racist one more time!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Utilizer
It worth noting that WinRar SFX is different product from plain WinRar,which the article does a poor job explaining.

WinRAR SFX = self extracting archive. It created an exe you run to decompress. It is inherently unsafe, so the exploit may not be such a big deal.

What most people sue is WinRAR, which compresses and decompresses .rar files. This is still safe.

5 posted on 10/02/2015 4:52:10 PM PDT by Wayne07
[ Post Reply | Private Reply | To 1 | View Replies]

To: Utilizer

These days, I scan everything I download with 3 different programs. Better safe than sorry...


6 posted on 10/02/2015 5:03:09 PM PDT by W. (I piss on the militant muslims & their horrid koran! GTFO of my America!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Utilizer
WinRAR itself is not the problem. It need not be patched.

http://www.rarlab.com/vuln_sfx_html2.htm

7 posted on 10/02/2015 5:57:07 PM PDT by TChad
[ Post Reply | Private Reply | To 1 | View Replies]

To: Utilizer; Abby4116; afraidfortherepublic; aft_lizard; AF_Blue; Alas Babylon!; amigatec; ...
Vulnerability related to (but not in) WinRAR ... PING!

You can find all the Windows Ping list threads with FR search: just search on keyword "windowspinglist".

Thanks to Utilizer for the ping!!

8 posted on 10/02/2015 6:46:28 PM PDT by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government.")
[ Post Reply | Private Reply | To 2 | View Replies]

To: TChad
> WinRAR itself is not the problem. It need not be patched. http://www.rarlab.com/vuln_sfx_html2.htm

Summary

To WinRAR users: most of latest publications about WinRAR vulnerability are heavily hyperbolized. WinRAR itself is not affected and you can use it to unpack all kinds of archives including self-extracting (.exe) as long as you unpack them with WinRAR and do not run them. The newly discovered issue does not add new risks to SFX archives (.exe files). You still need to run them only if they are received from a trustworthy source, as before. No patches for WinRAR are needed. If you have not installed Windows MS14-064 security update, please do it. It is important for entire Windows security, not just for WinRAR SFX.

To journalists and security experts: .exe files can run the executable code. They can even download and run files, really. Exe files are potentially dangerous. Any exe files. But .rar and .zip files are not .exe. Unpatched Windows systems are not safe. Thank you.

9 posted on 10/02/2015 6:48:30 PM PDT by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government.")
[ Post Reply | Private Reply | To 7 | View Replies]

To: Utilizer
I use p7zip, actually, since it has better compression and more configuration options but I believe there are still some WinRAR users out there.

7Zip all the way! WinRAR? I'm surprised to hear there are still legitimate copies of the software out there. I thought they went the way of WinZip.

10 posted on 10/04/2015 2:06:51 AM PDT by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 1 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson