19-year-old vulnerability in WinRAR finally fixed

Flaw affecting 500 million users could enable hackers to execute remote code

Security flaw

Security researchers have discovered a bug in the WinRAR file compression application that can allow hackers to execute code remotely. The flaw has existed in all versions of the software for the last 19 years.

According to a blog post by researchers at Check Point Software, the exploit works by just extracting an archive, and puts over 500 million users at risk.

"We found a logical bug using the WinAFL fuzzer and exploited it in WinRAR to gain full control over a victim's computer," said Nadav Grossman of Check Point Software.

"The exploit works by just extracting an archive and puts over 500 million users at risk. This vulnerability has existed for over 19 years(!) and forced WinRAR to completely drop support for the vulnerable format."

The flaw exists in the UNACEV2.DLL library included with all WinRAR versions. This library is used for parsing ACE (a data compression archive file format) archives.

Researchers found a path-traversal flaw that enables hackers to extract executable files into a computer's startup folder. This means that programs would run automatically whenever a system is booted up. All an attacker has to do is make a victim open a malicious archive file using WinRAR.

In response, WinRAR has dropped UNACEV2.dll from their package to fix the problem and has released WINRar version 5.70 beta 1 that doesn't support the ACE format. vWinRAR said that UNACEV2.DLL had not been updated since 2005 and it no longer has access to its source code.

The flaw is tracked under the CVE-2018-20250, CVE-2018-20251, CVE-2018-20252, and CVE-2018-20253 identifiers.

Windows users are advised to install the latest version of WinRAR as soon as possible and avoid opening files received from unknown sources.

Featured Resources

BIOS security: The next frontier for endpoint protection

Today’s threats upend traditional security measures

Download now

The role of modern storage in a multi-cloud future

Research exploring the impact of modern storage in defining cloud success

Download now

Enterprise data protection: A four-step plan

An interactive buyers’ guide and checklist

Download now

The total economic impact of Adobe Sign

Cost savings and business benefits enabled by Adobe Sign

Download now

Recommended

The ultimate guide to landing a cyber security career
Careers & training

The ultimate guide to landing a cyber security career

30 Sep 2020
8 of the most secure web browsers
web browser

8 of the most secure web browsers

25 Sep 2020
Your essential guide to internet security
Security

Your essential guide to internet security

23 Sep 2020
How to enable private browsing on any device
privacy

How to enable private browsing on any device

22 Sep 2020

Most Popular

16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

16 Sep 2020
16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

16 Sep 2020
Nokia will replace Huawei as BT's largest 5G equipment provider
5G

Nokia will replace Huawei as BT's largest 5G equipment provider

29 Sep 2020