
Extracting a 19 Year Old Code Execution from WinRAR

By
Research by: Nadav Grossman Introduction In this article, we tell the story of how we found a logical bug using the WinAFL fuzzer and exploited it in WinRAR to gain full control over a victim’s computer. The exploit works by just extracting an archive, and puts over 500 million users at risk. This vulnerability has existed… Click to Read More
The post Extracting a 19 Year Old Code Execution from WinRAR appeared first on Check Point Research.
You may also like
April 2025 Malware Spotlight: FakeUpdates Dominates as Multi-Stage Campaigns Blend Commodity Malware with Stealth
Cyber criminals are raising the stakes. This month, researchers uncovered ...
DragonForce Ransomware: Redefining Hybrid Extortion in 2025
The ransomware world isn’t just evolving—it’s fragmenting, decentralizing, and growing ...
Microsoft Dynamics 365 Customer Voice Phishing Scam
Overview: Check Point researchers have identified a new phishing campaign ...
AI Security Report 2025: Understanding threats and building smarter defenses
As artificial intelligence becomes more deeply embedded in business operations, ...