If both NTFS and Unix time extra fields were available for a file We would like to thank Andrey Polovinkin of Group-IB Threat Intelligence for reporting this bug. User interaction is required to exploit this vulnerability. Attackers could utilize affected archives to distribute malware. A vulnerability was discovered in the processing of ZIP format. We would like to thank goodbyeselene in collaboration with Trend Micro Zero Day Initiative for reporting this bug.įixed in new WinRAR Beta Version 6.23, released: Ĭritical Bug: CVE-2023-38831. This is fixed in the RAR4 recovery volume processing code. The vulnerability allows remote attackers to execute arbitrary code on affected installations. Previously they were deleted only on next WinRAR runs and onlyĬritical Bug: CVE-2023-40477. Rar$LS* temporary files, created when extracting or testing multipleĪrchives from Windows context menu, are now deleted immediately. Added extraction of XZ archives utilizing ARM64 filter.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |