19-year-old vulnerability in WinRAR finally fixed

Flaw affecting 500 million users could enable hackers to execute remote code

Security flaw

Security researchers have discovered a bug in the WinRAR file compression application that can allow hackers to execute code remotely. The flaw has existed in all versions of the software for the last 19 years.

According to a blog post by researchers at Check Point Software, the exploit works by just extracting an archive, and puts over 500 million users at risk.

"We found a logical bug using the WinAFL fuzzer and exploited it in WinRAR to gain full control over a victim's computer," said Nadav Grossman of Check Point Software.

"The exploit works by just extracting an archive and puts over 500 million users at risk. This vulnerability has existed for over 19 years(!) and forced WinRAR to completely drop support for the vulnerable format."

The flaw exists in the UNACEV2.DLL library included with all WinRAR versions. This library is used for parsing ACE (a data compression archive file format) archives.

Researchers found a path-traversal flaw that enables hackers to extract executable files into a computer's startup folder. This means that programs would run automatically whenever a system is booted up. All an attacker has to do is make a victim open a malicious archive file using WinRAR.

In response, WinRAR has dropped UNACEV2.dll from their package to fix the problem and has released WINRar version 5.70 beta 1 that doesn't support the ACE format. vWinRAR said that UNACEV2.DLL had not been updated since 2005 and it no longer has access to its source code.

The flaw is tracked under the CVE-2018-20250, CVE-2018-20251, CVE-2018-20252, and CVE-2018-20253 identifiers.

Windows users are advised to install the latest version of WinRAR as soon as possible and avoid opening files received from unknown sources.

Featured Resources

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Security best practices for PostgreSQL

Securing data with PostgreSQL

Download now

Transform your MSP business into a money-making machine

Benefits and challenges of a recurring revenue model

Download now

The care and feeding of cloud

How to support cloud infrastructure post-migration

Watch now

Recommended

How to encrypt files and folders in Windows 10
encryption

How to encrypt files and folders in Windows 10

9 Apr 2021
The definitive guide to IT security
Whitepaper

The definitive guide to IT security

9 Apr 2021
Evidence suggests REvil behind Harris Federation ransomware attack
ransomware

Evidence suggests REvil behind Harris Federation ransomware attack

9 Apr 2021
Fujitsu taps Trend Micro to secure private 5G networks in smart factories
5G

Fujitsu taps Trend Micro to secure private 5G networks in smart factories

8 Apr 2021

Most Popular

Microsoft is submerging servers in boiling liquid to prevent Teams outages
data centres

Microsoft is submerging servers in boiling liquid to prevent Teams outages

7 Apr 2021
Data belonging to 500 million LinkedIn users found for sale on hacker marketplace
hacking

Data belonging to 500 million LinkedIn users found for sale on hacker marketplace

8 Apr 2021
Hackers are using fake messages to break into WhatsApp accounts
instant messaging (IM)

Hackers are using fake messages to break into WhatsApp accounts

8 Apr 2021