WinRAR Security Update – 20 August 2023

RARLAB has released an updated WinRAR version to fix a vulnerability in versions before WinRAR 6.23.

The addressed vulnerability could allow the remote attacker to execute arbitrary code on the affected system by persuading the victim to open a specially crafted RAR file.

This flaw exists within the processing of recovery volumes, as the issue results from the lack of proper validation of user-supplied data, which can result in memory access past the end of an allocated buffer. The attacker could leverage this vulnerability to execute code in the context of the current process.

RARLAB WinRAR Code Execution Vulnerability (CVE-2023-40477):

  • CVSS: 7.8
  • Attack Vector: Local
  • Attack Complexity: Low
  • Privileges Required: None
  • User Interaction: Required
  • Consequences: Gain Access

It should be highlighted that security researchers mentioned that the addressed vulnerability is actively exploited in the wild.

Vulnerabilities

CVE-2023-40477

Mitigations

The enterprise should deploy this patch as soon as the testing phase is completed.

WinRAR Security Advisory

References