A critical security flaw in the widely used WinRAR file archiver utility for Windows has been remedied, preventing potential remote code execution by attackers when users open RAR archives. The vulnerability, identified as CVE-2023-40477, allowed malicious actors to execute arbitrary code on targeted systems through specially crafted RAR files.
This vulnerability was brought to light by a researcher named “goodbyeselene” from the Zero Day Initiative, who reported the issue to RARLAB, the vendor, on June 8th, 2023. The flaw stemmed from improper validation of user-supplied data within the processing of recovery volumes, potentially leading to memory access beyond allocated buffers.
Although the severity rating of the vulnerability is 7.8 on the Common Vulnerability Scoring System (CVSS), attackers could exploit users’ actions with relative ease, given the considerable size of WinRAR’s user base. Consequently, users are advised to remain vigilant and update to WinRAR version 6.23, which was released on August 2nd, 2023.
This update addresses the flaw and includes fixes for other high-severity problems related to RAR archives. Additionally, Microsoft’s integration of native support for RAR, 7-Zip, and GZ files in Windows 11 might reduce the dependence on third-party software like WinRAR, except for advanced features.
To mitigate risks, individuals continuing to use WinRAR should prioritize keeping their software updated, as attackers have previously exploited similar vulnerabilities to distribute malware.
Furthermore, users should exercise caution when opening RAR files and consider utilizing antivirus tools capable of scanning archives. This incident serves as a reminder of the ongoing need for cybersecurity awareness and proactive measures to safeguard against potential threats in the digital landscape.