Extracting a 19 Year Old Code Execution from WinRAR
By
Research by: Nadav Grossman Introduction In this article, we tell the story of how we found a logical bug using the WinAFL fuzzer and exploited it in WinRAR to gain full control over a victim’s computer. The exploit works by just extracting an archive, and puts over 500 million users at risk. This vulnerability has existed… Click to Read More
The post Extracting a 19 Year Old Code Execution from WinRAR appeared first on Check Point Research.
You may also like
Shifting Attack Landscapes and Sectors in Q1 2024 with a 28% increase in cyber attacks globally
Recurring increase in cyber attacks: Q1 2024 saw a marked ...
Not So Private After All: How Dating Apps Can Reveal Your Exact Location
Check Point Research (CPR) recently analyzed several popular dating applications ...
Agent Tesla Targeting United States & Australia: Revealing the Attackers’ Identities
Highlights Check Point Research (CPR) uncovered three recent malicious campaigns ...
Beyond Imagining – How AI is actively used in election campaigns around the world
Key Findings AI is already extensively utilized in election campaigns ...