Doesn't always work. There are .zip archives that 7zip can't unpack, but WinRAR can and vice versa. I noticed this at work quite a few times. I really need both.
Comment has been collapsed.
I was taking about the .zip archive format specifically. Of course a *.zip file can be different compression methods. Never bothered to find out under which circumstances WinRAR or 7zip are not able to process a zip file. It doesn't happen too frequently of course. But it has already happened multiple times.
Comment has been collapsed.
Of course a *.zip file can be different compression methods. Never bothered to find out under which circumstances WinRAR or 7zip are not able to process a zip file.
Okay, I'll take your word on that, but I was asking about it in reference to Windows Explorer's default .zip decompression. In my experience, the only time Windows Explorer couldn't open a ".zip" file was when it was actually a mislabled .rar file as a result of the user misusing WinRAR, which doesn't count (and 7zip opened it just fine). I guess what I'm trying to say is that we don't need WinRAR if Windows Explorer itself covers for everything 7zip doesn't.
Comment has been collapsed.
Good point, actually. I tend to forget about the fact that the Explorer can also unzip files. Mostly because of the horrible interface. Don't use it at all. I am pretty sure I never tried it in these instances.
Comment has been collapsed.
For the exploit to work you would first need to find such archive somewhere, want to download and extract it, so I'll still be safe using Common Sense Suite 2019 no matter which archiver I'm using.
They were used in phishing attacks that lured with archived pictures or documents.
Just say no to spam, easy and simple.
Comment has been collapsed.
I think I used it until the mid-2000s. I switched to RAR for a year or two before WinACE became a dead product, and when RAR compression started to become more than a glorified container compared to ACE compression levels. Of course, then I discovered 7zip and LZMA2 that reached up to 50% better sizes than my old RAR archives, and still did not have to switch from that. At least not until someone manages to make ZPAQ viable on consumer grade PCs.
Comment has been collapsed.
I am more surprised that there is still anyone out there using WinRAR. I cannot name a single thing 7-Zip or PeaZip don't do better for free. Same goes for WinZip, although I haven't heard or seen anyone using that for over half a decade now.
Comment has been collapsed.
We still (not my choice) use WinZip at the office. /facepalm
Comment has been collapsed.
What's worse, the integrated Windows zip actually worked for a while, but I.T. disabled it because people weren't using WinZip (or maybe some other reason - it was a few years ago).
I'm 7Zip all the way for personal use!
Comment has been collapsed.
Some compression / decompression software tries to use a DLL in a specific folder of a personal computer and work.
Therefore, if a vulnerable DLL exists in a personal computer, an unfortunate event may occur.
By the way, 7zip has a similar problem last summer.
NVD - CVE-2018-10115 https://nvd.nist.gov/vuln/detail/CVE-2018-10115
Are you using the latest version?
Probably all right?
Comment has been collapsed.
Good points. I generally update everything whenever prompted.
Comment has been collapsed.
The 7-zip GUI needs a little help though.. For one there's no keyboard shortcut to "test" files and you have to use the icon->mouse. Unless I'm missing something.. I also miss the option of WinRar to create archive based on latest file timestamp (at least it is present in the command line but sometimes you want to use the GUI version).
Everything else (I could be forgetting something) is fine and/or better though..
Comment has been collapsed.
That's why using third-party libraries is not safe.
But I still hate those yellow press titles. "over 100 exploits" - oh come on, it's ONE vulnerability, it does not matter that there are multiple cases of it's usage, it's still ONE, not "over 100". And, even this ONE vulnerability is in free third-party library authors used, not in winrar itself. If any other software is using the same library - it's vulnerable too, but that's not interesting to yellow journalists, because everyone heard about winrar, and if title was "One vulnerability found in free library to unpack .ace archives" - nobody would even notice it.
EDIT: Just as I said. TotalCommander is also affected , because it used the same library.
Comment has been collapsed.
Have to wonder the amount of Ariana Grande fans that are not very tech savvy though. I certainly know locally, theyre very much the iphone generation and tend to have little clue about basic net safety like antivirus (just to begin with).
I've no doubt there are plenty that do have more than a clue as well - Im just talking about those I meet / know / know through others.
Comment has been collapsed.
The music files would be delivered in an archive file named "Ariana_Grande-thank_u,next(2019)[320].rar."
Well, they were downloading 2 viruses then.
Comment has been collapsed.
I was still using version 5.11 from 2014, yikes. Used to use it a lot more for Minecraft mods, the only time I can remember really using it since my "new" comp was for Humble Monthly Trove once. Thanks for the heads up.
Comment has been collapsed.
The company identified more than 100 exploits
Actually one.
Comment has been collapsed.
I've been using 7-Zip for several years now. It's free and does everything that WinRAR does.
Comment has been collapsed.
Well, I never liked Ariana Grande´s music anyway.
Guess I´m gonna use 7zip from now on. I was with WinRAR 4.0 :P
Comment has been collapsed.
goodbye winrar 4.11, you have seen it all during the last years. good thing you can't tell anyone.
Comment has been collapsed.
15 Comments - Last post 23 minutes ago by MSPachina
349 Comments - Last post 1 hour ago by gr4yw4rd3n
2,038 Comments - Last post 3 hours ago by LordDarkness
6 Comments - Last post 3 hours ago by anditsung
551 Comments - Last post 7 hours ago by Warriot
104 Comments - Last post 8 hours ago by hbouma
3,110 Comments - Last post 9 hours ago by Peiperissimus
5,695 Comments - Last post 3 minutes ago by MeioAmargo
200 Comments - Last post 42 minutes ago by Fallador
443 Comments - Last post 2 hours ago by lav29
863 Comments - Last post 2 hours ago by LegendaryEagleKnight
7,919 Comments - Last post 3 hours ago by Masafor
1,161 Comments - Last post 3 hours ago by Pyrocious
139 Comments - Last post 3 hours ago by ConanOLion
A code execution vulnerability in WinRAR generated over a hundred distinct exploits in the first week since its disclosure, and the number of exploits keeps on swelling.
The hackers' interest was probably piqued by the 500 million user base of the file-compression software and that the flaw (CVE-2018-20250) was present on all its versions released over the past 19 years. Furthermore, the reward would be full control over a victim’s system.
McAfee researcher Craig Schmugar reported on Thursday in one recent attack they observed the hackers enticed victims with a bootlegged copy of Ariana Grande's album "Thank U, Next."
The music files would be delivered in an archive file named "Ariana_Grande-thank_u,next(2019)[320].rar." Using a vulnerable version of WinRAR to extract the files, a malicious payload is added to the Windows Startup folder.
The researcher says that most of the targets observed initially were residents of the United States. The company identified more than 100 exploits the week following the vulnerability disclosure, with the number being on the rise.
"User Access Control (UAC) is bypassed, so no alert is displayed to the user. The next time the system restarts, the malware is run," Schmugar explains.
Exploits emerge two days after bug disclosure.
Security researchers from 360 Threat Intelligence Center discovered exploits for the WinRAR used in the wild on February 20, two days after its public disclosure. They were used in phishing attacks that lured with archived pictures or documents.
More recently the Chinese researchers noticed a campaign using documents relating to the United Nations Human Rights to lure victims in the Middle East. The payload was a remote access tool (RAT) currently detected by at least 28 antivirus engines.
CVE-2018-20250 was discovered by Nadav Grossman from Check Point using WinAFL fuzzer. It is an ACE path traversal logical bug in the library 'unacev2.dll' added to WinRAR to extract the old, and now rarely used ACE archive format.
The library code remained unchanged since 2005. Its source code was lost in the meantime, so the maintainers of WinRAR could no longer fix the vulnerable part. Because of this, the solution was to remove support for ACE archives in the first beta of WinRAR 5.70.
However, users can still enjoy ACE support in WinRAR by applying a micropatch specifically created address this issue. The solution is available via the 0Patch platform from ACROS Security.
WinRAR users are advised to use either solution to immunize the program against current exploitation methods.
https://www.bleepingcomputer.com/news/security/over-100-exploits-found-for-19-year-old-winrar-rce-bug/
Comment has been collapsed.