![]() Attackers could utilize affected archives to distribute malware. ![]() A vulnerability was discovered in the processing of ZIP format. We would like to thank goodbyeselene in collaboration with Trend Micro Zero Day Initiative for reporting this bug.įixed in new WinRAR Beta Version 6.23, released: Ĭritical Bug: CVE-2023-38831. This is fixed in the RAR4 recovery volume processing code. User interaction is required to exploit this vulnerability. The vulnerability allows remote attackers to execute arbitrary code on affected installations. ![]() Previously they were deleted only on next WinRAR runs and onlyĬritical Bug: CVE-2023-40477. Rar$LS* temporary files, created when extracting or testing multipleĪrchives from Windows context menu, are now deleted immediately. We are thankful to Ata Hakcil for reporting this issue.Added extraction of XZ archives utilizing ARM64 filter. It didn't affect file name and type, which were displayed properly. In this case unpacked data size and checksum could mismatch file size and checksum displayed in WinRAR file list.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |