101010.pl is one of the many independent Mastodon servers you can use to participate in the fediverse.
101010.pl czyli najstarszy polski serwer Mastodon. Posiadamy wpisy do 2048 znaków.

Server stats:

490
active users

#winrar

1 post1 participant0 posts today

WinRAR 7.10 Enhances Privacy by Limiting Windows Metadata

The latest WinRAR update restricts Windows' Mark of the Web (MoTW) data to improve privacy during file extraction.

By default, only the security zone identifier is retained, omitting details like download URLs and IP addresses.

Users can adjust this setting in "Settings > Security" to restore full MoTW data if needed.

Continued thread

To detect these behaviors, we’ve developed two #Sigma rules to identify unusual #WinRAR activity:

✅Create WinRAR Archive - Recurse Subfolders
✅Create WinRAR Archive - Specify Volume Size

These rules focus on commands that deviate from typical WinRAR usage in most environments

RARLAB WinRAR ANSI Escape Sequence Vulnerability

Date: May 18, 2024

CVE: CVE-2024-36052

Vulnerability Type: Improper Input Validation

CWE: [[CWE-116]], [[CWE-74]], [[CWE-707]]

Sources: VulDB, RARLAB Explaination ANSI Escape Injection Vulnerability in WinRAR

Issue Summary

A vulnerability has been discovered in RARLAB WinRAR versions up to 6.x on Windows. This issue, classified under CVE-2024-36052, involves the improper handling of ANSI escape sequences, which can lead to manipulated screen output. The vulnerability allows remote attackers to exploit this flaw without authentication, although user interaction is necessary for successful exploitation.

Technical Key Findings

The vulnerability stems from the ANSI Escape Sequence Handler within WinRAR. When a specially crafted ZIP archive containing a file with ANSI escape sequences in its name is extracted using WinRAR, the application fails to properly handle the escape sequences. Improper encoding or escaping of data results in the manipulation of screen output. This can be abused by embedding ANSI escape sequences in archive files, which when viewed by the user, can alter the output displayed in the terminal or command prompt.

Vulnerable Products

  • WinRAR versions up to 6.x on Windows.

Impact Assessment

Exploiting this vulnerability can lead to the spoofing of screen outputs, potentially misleading users or administrators about the state of their system or actions being performed. This can compromise the integrity of information presented on the screen, leading to potential security breaches.

Patches or Workaround

Upgrading to WinRAR version 7.00 eliminates this vulnerability. Users are strongly advised to update to the latest version to mitigate this risk.

Tags

#WinRAR #CVE-2024-36052 #ANSI_escape_sequence #file_compression #vulnerability #cybersecurity #CWE-116 #CWE-74 #CWE-707 #remote_attack #patch_availability

vuldb.com · Rarlab WinRAR ANSI Escape Sequence escape outputA vulnerability was found in Rarlab WinRAR up to 6.x on Windows and classified as problematic. This vulnerability is handled as CVE-2024-36052. It is recommended to upgrade the affected component.