Extracting a 19 Year Old Code Execution from WinRAR
By
Research by: Nadav Grossman Introduction In this article, we tell the story of how we found a logical bug using the WinAFL fuzzer and exploited it in WinRAR to gain full control over a victim’s computer. The exploit works by just extracting an archive, and puts over 500 million users at risk. This vulnerability has existed… Click to Read More
The post Extracting a 19 Year Old Code Execution from WinRAR appeared first on Check Point Research.
You may also like
Cracking the Code: How Banshee Stealer Targets macOS Users
Executive Summary: Since September, Check Point Research (CPR) has been ...
November 2024’s Most Wanted Malware: Androxgh0st Leads the Pack, Targeting IoT Devices and Critical Infrastructure
Check Point Software’s latest threat index highlights the rise of ...
The Exploitation of Gaming Engines: A New Dimension in Cybercrime
Executive Summary Check Point Research discovered a new technique using ...
Navigating the Evolving Threat Landscape Ahead of Black Friday
As Thanksgiving and Black Friday approach, so do the risks ...