{"id":92050,"date":"2023-09-04T11:51:13","date_gmt":"2023-09-04T06:21:13","guid":{"rendered":"https:\/\/blogs.quickheal.com\/?p=92050"},"modified":"2023-09-04T11:51:13","modified_gmt":"2023-09-04T06:21:13","slug":"threat-advisory-zero-day-vulnerabilities-detected-on-winrar","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/threat-advisory-zero-day-vulnerabilities-detected-on-winrar\/","title":{"rendered":"THREAT ADVISORY: Zero-Day Vulnerabilities Detected on WinRAR"},"content":{"rendered":"<p><span data-contrast=\"auto\">Zero-day vulnerabilities represent an imminent threat to cybersecurity, and in this case, two such vulnerabilities, CVE-2023-38831 and CVE-2023-40477, have been identified in the widely utilized WinRAR software.<\/span> <span data-contrast=\"auto\">These vulnerabilities pose a grave concern due to their potential for remote code execution, presenting a severe threat risk.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">WinRAR is a popular compression tool with half<\/span><span data-contrast=\"auto\"> a <\/span><span data-contrast=\"auto\">&#8211;<\/span><span data-contrast=\"auto\">billion users worldwide and plays an integral role in countless digital operations. <\/span><span data-contrast=\"auto\">This fact heightens the probable impact of these vulnerabilities, as any exploitation could severely affect the digital landscape.<\/span><\/p>\n<p><span data-contrast=\"auto\">These vulnerabilities require user interaction for exploitation. Remote attackers, with malicious intent<\/span><span data-contrast=\"auto\">,<\/span><span data-contrast=\"auto\"> can execute arbitrary code on systems where WinRAR is installed. The software&#8217;s functionality, which includes archive creation in RAR or ZIP file formats, displays and unpacks numerous archive file formats. This further amplifies the potential for compromise as WinRAR\u2019s ability to support <\/span><span data-contrast=\"auto\">the <\/span><span data-contrast=\"auto\">creation of encrypted archives, multi-part files, and self-extraction adds to the c<\/span><span data-contrast=\"auto\">omplexity of the situation.<\/span><span data-contrast=\"auto\"> Furthermore, file integrity is verified using CRC32 or BLAKE2 checksums for each file within an archive, highlighting the significance of these gaps in the system.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">This advisory is our detailed analysis and report of the above findings.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><strong><span class=\"TextRun SCXW242355630 BCX0\" lang=\"EN\" xml:lang=\"EN\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW242355630 BCX0\">Why is Immediate Action Required <\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW242355630 BCX0\"><span class=\"TextRun SCXW242355630 BCX0\" lang=\"EN\" xml:lang=\"EN\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW242355630 BCX0\">against these<\/span><\/span><\/span><span class=\"TrackChangeTextDeletionMarker TrackedChange SCXW242355630 BCX0\"><span class=\"TextRun SCXW242355630 BCX0\" lang=\"EN\" xml:lang=\"EN\" data-contrast=\"auto\"><span class=\"NormalTextRun TrackChangeTextDeletion SCXW242355630 BCX0\">A<\/span><\/span><\/span><span class=\"TrackChangeTextDeletionMarker TrackedChange SCXW242355630 BCX0\"><span class=\"TextRun SCXW242355630 BCX0\" lang=\"EN\" xml:lang=\"EN\" data-contrast=\"auto\"><span class=\"NormalTextRun TrackChangeTextDeletion SCXW242355630 BCX0\">gainst <\/span><\/span><\/span><span class=\"TrackChangeTextDeletionMarker TrackedChange SCXW242355630 BCX0\"><span class=\"TextRun SCXW242355630 BCX0\" lang=\"EN\" xml:lang=\"EN\" data-contrast=\"auto\"><span class=\"NormalTextRun TrackChangeTextDeletion SCXW242355630 BCX0\">T<\/span><\/span><\/span><span class=\"TrackChangeTextDeletionMarker TrackedChange SCXW242355630 BCX0\"><span class=\"TextRun SCXW242355630 BCX0\" lang=\"EN\" xml:lang=\"EN\" data-contrast=\"auto\"><span class=\"NormalTextRun TrackChangeTextDeletion SCXW242355630 BCX0\">hese<\/span><\/span><\/span><span class=\"TextRun SCXW242355630 BCX0\" lang=\"EN\" xml:lang=\"EN\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW242355630 BCX0\"> Vulnerabilities?<\/span><\/span><span class=\"EOP SCXW242355630 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/strong><\/p>\n<p><span class=\"TextRun SCXW235637858 BCX0\" lang=\"EN\" xml:lang=\"EN\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW235637858 BCX0\">Users using WinRAR <\/span><\/span><span class=\"TextRun Highlight SCXW235637858 BCX0\" lang=\"EN\" xml:lang=\"EN\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW235637858 BCX0\">version older than 6.23 are at risk. These vulnerabilities <\/span><\/span><span class=\"TextRun SCXW235637858 BCX0\" lang=\"EN\" xml:lang=\"EN\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW235637858 BCX0\">allow users to execute arbitrary code when attempting to view a benign file in a ZIP archive. The issue occurs when a ZIP archive may include a benign file (such as an ordinary .JPG file)<\/span><\/span><span class=\"TrackChangeTextDeletionMarker TrackedChange SCXW235637858 BCX0\"><span class=\"TextRun SCXW235637858 BCX0\" lang=\"EN\" xml:lang=\"EN\" data-contrast=\"auto\"><span class=\"NormalTextRun TrackChangeTextDeletion SCXW235637858 BCX0\">,<\/span><\/span><\/span><span class=\"TextRun SCXW235637858 BCX0\" lang=\"EN\" xml:lang=\"EN\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW235637858 BCX0\"> and a folder with the same name as the benign file.\u00a0<\/span><\/span> <span class=\"TrackChangeTextInsertion TrackedChange TrackChangeHoverSelectColorRed SCXW235637858 BCX0\"><span class=\"TextRun SCXW235637858 BCX0\" lang=\"EN\" xml:lang=\"EN\" data-contrast=\"auto\"><span class=\"NormalTextRun TrackChangeHoverSelectHighlightRed SCXW235637858 BCX0\">The folder&#8217;s contents (which may include executable content) are processed while attempting to access only the benign file.<\/span><\/span><\/span><\/p>\n<p><span class=\"TextRun SCXW146874510 BCX0\" lang=\"EN\" xml:lang=\"EN\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW146874510 BCX0\">This was the gap being exploited in the wild from April through August 2023 by threat actors. Breach attempts were made on online cryptocurrency trading accounts through these vulnerabilities.<\/span><\/span><span class=\"EOP SCXW146874510 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559737&quot;:460,&quot;335559738&quot;:140,&quot;335559740&quot;:307}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">CVE-2023-40477 =&gt; Recovery Volume, Improper Validation of Array Index: Remote Code Execution Vulnerability<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559737&quot;:460,&quot;335559738&quot;:140,&quot;335559740&quot;:307}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Users who open specially crafted WinRAR archives on their devices may fall prey to the attack. The downloading of such a specially crafted archive and the opening of it on the user&#8217;s system is sufficient to allow attackers to execute arbitrary code on the device.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559737&quot;:460,&quot;335559738&quot;:140,&quot;335559740&quot;:307}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The issue, identified as <\/span><span data-contrast=\"auto\">CVE-2023-40477<\/span><span data-contrast=\"auto\">,<\/span><span data-contrast=\"auto\"> is a high-severity vulnerability that exists in the processing of recovery volumes. A buffer overflow is possible when processing recovery volume names in the old RAR 3.0 format. <\/span><span data-contrast=\"auto\">To trigger this vulnerability, the user must start unpacking a RAR file in the same folder as a recovery archive file with a malformed name.<\/span><\/p>\n<p><span data-contrast=\"auto\">The vulnerability exists in the processing of recovery volumes and results from a lack of proper validation of user-supplied data. This can lead to memory access beyond the end of an allocated buffer.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559737&quot;:460,&quot;335559738&quot;:140,&quot;335559740&quot;:307}\">\u00a0<\/span><\/p>\n<p><i><span data-contrast=\"none\">Software using WinRAR libraries was also affected<\/span><\/i><span data-ccp-props=\"{&quot;134245418&quot;:false,&quot;134245529&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:100,&quot;335559739&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The libraries unrar.dll and unrar64.dl<\/span><span data-contrast=\"auto\"> are vulnerable.<\/span> <span data-contrast=\"auto\">The libraries &#8220;unrar.dll&#8221; and &#8220;unrar64.dll&#8221; used by WinRAR are used in many software products (including <\/span><span data-contrast=\"auto\">virus scanners<\/span><span data-contrast=\"auto\">). If old versions of the libraries are used there, the vulnerabilities mentioned above also exist there. <\/span><span data-contrast=\"auto\">And in<\/span><span data-contrast=\"auto\">In<\/span><span data-contrast=\"auto\"> the case of virus scanners, this is even more critical than with WinRAR since<\/span><span data-contrast=\"auto\"> the anti-virus software usually runs with elevated privileges<\/span><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559737&quot;:460,&quot;335559738&quot;:140,&quot;335559740&quot;:307}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">CVE-2023-38831 =&gt; File Extension Spoofing Vulnerability<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559737&quot;:460,&quot;335559738&quot;:140,&quot;335559740&quot;:307}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">On opening the archives, users cannot differentiate the harmless files hiding the malicious payload.<\/span><\/p>\n<p><span data-contrast=\"auto\">Here<\/span><span data-contrast=\"auto\">,<\/span><span data-contrast=\"auto\"> we see a pdf file and a folder with the same name.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559737&quot;:460,&quot;335559738&quot;:140,&quot;335559740&quot;:307}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-92052 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/09\/MicrosoftTeams-image-4-650x342.png\" alt=\"\" width=\"650\" height=\"342\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/09\/MicrosoftTeams-image-4-650x342.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/09\/MicrosoftTeams-image-4-300x158.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/09\/MicrosoftTeams-image-4-150x79.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/09\/MicrosoftTeams-image-4.png 734w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p><em>Figure 1<\/em><span data-contrast=\"auto\"><em>: Opening the crafted archive results while launching the calculator before the actual pdf file is opened<\/em>.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559737&quot;:460,&quot;335559738&quot;:140,&quot;335559740&quot;:307}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">However, when the user double-clicks on the PDF, the <\/span><span data-contrast=\"auto\">CVE-2023-38831<\/span><span data-contrast=\"auto\"> vulnerability will quietly launch a script in the folder to install malware on the device (as the calculator is launched).\u00a0 At the same time, these scripts will also load the decoy document so as not to arouse suspicion.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559737&quot;:460,&quot;335559738&quot;:140,&quot;335559740&quot;:307}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The vulnerability is triggered by creating specially crafted archives with a slightly modified structure compared to safe files, which causes WinRAR&#8217;s <\/span><span data-contrast=\"auto\">ShellExecute<\/span> <span data-contrast=\"auto\">function to receive an incorrect parameter when it attempts to open the decoy file<\/span><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">This results in the program skipping the harmless file and instead locating and executing a batch or CMD script, so while the user assumes they open a safe file, the program launches a different one.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559737&quot;:460,&quot;335559738&quot;:140,&quot;335559740&quot;:307}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\"><strong>Infection Chain:<\/strong>\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559737&quot;:460,&quot;335559738&quot;:140,&quot;335559740&quot;:307}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-92051 size-full\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/09\/MicrosoftTeams-image-5.png\" alt=\"\" width=\"593\" height=\"352\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/09\/MicrosoftTeams-image-5.png 593w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/09\/MicrosoftTeams-image-5-300x178.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/09\/MicrosoftTeams-image-5-150x89.png 150w\" sizes=\"(max-width: 593px) 100vw, 593px\" \/><\/p>\n<p><b><span data-contrast=\"auto\">IOC:<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559737&quot;:460,&quot;335559738&quot;:140,&quot;335559740&quot;:307}\">\u00a0<\/span><\/p>\n<table data-tablestyle=\"Custom\" data-tablelook=\"0\" aria-rowcount=\"6\">\n<tbody>\n<tr aria-rowindex=\"1\">\n<td data-celllook=\"69905\"><b><span data-contrast=\"auto\">FileName<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:100,&quot;335559737&quot;:460,&quot;335559738&quot;:140,&quot;335559740&quot;:307}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><b><span data-contrast=\"auto\">SHA-2 Hash<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:100,&quot;335559737&quot;:460,&quot;335559738&quot;:140,&quot;335559740&quot;:307}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"2\">\n<td data-celllook=\"4369\"><span data-contrast=\"auto\">Trading_Strategy_2023.rar<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:100,&quot;335559737&quot;:460,&quot;335559738&quot;:140,&quot;335559740&quot;:307}\">\u00a0<\/span><\/td>\n<td data-celllook=\"4369\"><span data-contrast=\"auto\">763df8b2db7f2f2fa0c8adb8c1cc05ff15b59e6a9756cbe9fc4a1c12329b62af<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:100,&quot;335559737&quot;:460,&quot;335559738&quot;:140,&quot;335559740&quot;:307}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"3\">\n<td data-celllook=\"4369\"><span data-contrast=\"auto\">Cryptocurrencies2023_mpgh.net.rar<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:100,&quot;335559737&quot;:460,&quot;335559738&quot;:140,&quot;335559740&quot;:307}\">\u00a0<\/span><\/td>\n<td data-celllook=\"4369\"><span data-contrast=\"auto\">0860e09e529fc6ccbbffebafedc27497fbbcaff57b5376fb4cc732c331d1f591<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:100,&quot;335559737&quot;:460,&quot;335559738&quot;:140,&quot;335559740&quot;:307}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"4\">\n<td data-celllook=\"4369\"><span data-contrast=\"auto\">Screenshot_19_04_2023.rar<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:100,&quot;335559737&quot;:460,&quot;335559738&quot;:140,&quot;335559740&quot;:307}\">\u00a0<\/span><\/td>\n<td data-celllook=\"4369\"><span data-contrast=\"auto\">18129626041b90558607eec67616ba6d2b1ea28a280c7ba5b2bd30ebb1e2438b<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:100,&quot;335559737&quot;:460,&quot;335559738&quot;:140,&quot;335559740&quot;:307}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"5\">\n<td data-celllook=\"4369\"><span data-contrast=\"auto\">TSG_Strategies.rar\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:100,&quot;335559737&quot;:460,&quot;335559738&quot;:140,&quot;335559740&quot;:307}\">\u00a0<\/span><\/td>\n<td data-celllook=\"4369\"><span data-contrast=\"auto\">5a387ee6d0dcbbf2cd97379c68d8e3398d01a920873ddd45ff21dbfccb19e2ee<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:100,&quot;335559737&quot;:460,&quot;335559738&quot;:140,&quot;335559740&quot;:307}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"6\">\n<td data-celllook=\"4369\"><span data-contrast=\"auto\">New Agreement.rar<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:100,&quot;335559737&quot;:460,&quot;335559738&quot;:140,&quot;335559740&quot;:307}\">\u00a0<\/span><\/td>\n<td data-celllook=\"4369\"><span data-contrast=\"auto\">0059121d725a818e453e29492e78762d0a87087fcb11e484cf5ad663c1eba2bc<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:100,&quot;335559737&quot;:460,&quot;335559738&quot;:140,&quot;335559740&quot;:307}\">\u00a0<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><b><span data-contrast=\"auto\">\u00a0<\/span><\/b><b><span data-contrast=\"auto\">Mitigation<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">RARLAB released WinRAR version 6.23 on August 2<\/span><span data-contrast=\"auto\">nd<\/span><span data-contrast=\"auto\">, 2023, and another update on August 24, 2023<\/span><span data-contrast=\"auto\">,<\/span><span data-contrast=\"auto\"> effectively resolving CVE-2023-40477 and CVE-2023-38831. It is advised that WinRAR users apply this security patch with immediate effect.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Release notes:<\/span> <a href=\"https:\/\/www.win-rar.com\/singlenewsview.html?&amp;L=0\"><span data-contrast=\"none\">https:\/\/www.win-rar.com\/singlenewsview.html?&amp;L=0<\/span><\/a><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">This version also fixes another significant issue related to specially crafted archives, which helps in incorrect file initialization while extracting specially crafted archives.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p aria-level=\"2\"><b><span data-contrast=\"auto\">\u00a0<\/span><\/b><span data-ccp-props=\"{&quot;134245418&quot;:false,&quot;134245529&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:120,&quot;335559737&quot;:6520,&quot;335559738&quot;:180,&quot;335559739&quot;:0,&quot;335559740&quot;:235}\">\u00a0<\/span><\/p>\n<p>Authors:<\/p>\n<p>Adrip Mukherjee<\/p>\n<p>Amruta Wagh<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Zero-day vulnerabilities represent an imminent threat to cybersecurity, and in this case, two such vulnerabilities, CVE-2023-38831 and CVE-2023-40477, have been identified in the widely utilized WinRAR software. These vulnerabilities pose a grave concern due to their potential for remote code execution, presenting a severe threat risk.\u00a0 WinRAR is a popular compression tool with half a [&hellip;]<\/p>\n","protected":false},"author":75,"featured_media":92053,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1660,1653,289,36,1,1395],"tags":[1327,471,534,1699,80,1602,2000,1249,624],"class_list":["post-92050","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-advisory","category-antivirus","category-cyber-safety","category-security-patch","category-uncategorized","category-vulnerability","tag-cve","tag-cyber-threats","tag-cybersecurity","tag-microsoft-windows","tag-quick-heal","tag-rce","tag-threat-advisory","tag-windows","tag-zero-day-attack"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/92050"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/75"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=92050"}],"version-history":[{"count":2,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/92050\/revisions"}],"predecessor-version":[{"id":92055,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/92050\/revisions\/92055"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/92053"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=92050"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=92050"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=92050"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}