RARLAB has released an updated WinRAR version to fix a vulnerability in versions before WinRAR 6.23.
The addressed vulnerability could allow the remote attacker to execute arbitrary code on the affected system by persuading the victim to open a specially crafted RAR file.
This flaw exists within the processing of recovery volumes, as the issue results from the lack of proper validation of user-supplied data, which can result in memory access past the end of an allocated buffer. The attacker could leverage this vulnerability to execute code in the context of the current process.
RARLAB WinRAR Code Execution Vulnerability (CVE-2023-40477):
It should be highlighted that security researchers mentioned that the addressed vulnerability is actively exploited in the wild.
CVE-2023-40477
The enterprise should deploy this patch as soon as the testing phase is completed.
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |