Extracting Code Execution from WinRAR

R2qcBWJzHMo/default.jpg

In this article, we tell the story of how we found a logical bug using the WinAFL fuzzer and exploited it in WinRAR to gain full control over a victim's computer. The exploit works by just extracting an archive, and puts over 500 million users at risk. For more information visit http://bit.ly/2DUUngA

For full technical details, please visit Check Point Research http://bit.ly/2Xal7Cy

R2qcBWJzHMo/default.jpg
Extracting Code Execution from WinRAR Extracting Code Execution from WinRAR Reviewed by Anonymous on February 20, 2019 Rating: 5