First published: Mon Apr 01 2024(Updated: )
This vulnerability allows remote attackers to bypass the Mark-Of-The-Web protection mechanism on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must perform a specific action on a malicious page. The specific flaw exists within the archive extraction functionality. A crafted archive entry can cause the creation of an arbitrary file without the Mark-Of-The-Web. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current user.
Affected Software | Affected Version | How to fix |
---|---|---|
WinRAR |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-24-357 is considered medium due to the potential for remote attackers to bypass security mechanisms.
To fix ZDI-24-357, users should update their RARLAB WinRAR to the latest version available from the official site.
The potential impacts of ZDI-24-357 include unauthorized access to files and data due to bypassed security protections.
ZDI-24-357 affects installations of RARLAB WinRAR that have not been updated to address this vulnerability.
Users should exercise caution when interacting with unfamiliar web pages and ensure their WinRAR software is updated.