Extracting Code Execution from WinRAR
In this article, we tell the story of how we found a logical bug using the WinAFL fuzzer and exploited it in WinRAR to gain full control over a victim's computer. The exploit works by just extracting an archive, and puts over 500 million users at risk. For more information visit http://bit.ly/2DUUngA
For full technical details, please visit Check Point Research http://bit.ly/2Xal7Cy
Extracting Code Execution from WinRAR
Reviewed by Anonymous
on
February 20, 2019
Rating: