Third-party micropatch for RCE vulnerability in WinRAR retains ACE support



A few days ago, Security Lab 
wrote about a critical vulnerability in the popular WinRAR archiver for Windows, affecting all versions of the tool released over the past 19 years. The problem is related to the use of the obsolete third-party UNACEV2.DLL library and allows you to execute code on the target system.
For a successful attack, the attacker will only need to convince the victim to unpack the malicious ACE archive using WinRAR. The archiver developers have already released a revised version of WinRAR 5.70 Beta 1, in which the UNACEV2.DLL library has been deleted and, accordingly, support for unpacking files in ACE format.
In this regard, ACROS Security specialistsreleased amicropatch for all 32-bit and 64-bit versions of WinRAR using the UNACEV2.DLL version from 2005, while preserving the possibility of unpacking files in ACE format. According to the developers, the patch is also compatible with other products that implement this version of the DLL. After installing the patch on the computer in case of unpacking the malicious archive in ACE format, a number of warnings will be displayed on the screen, and the files contained in it will not be extracted. To install the patch, users will need to download the free 0patch Agent application and register it on the device.
0patch is a platform for eliminating zero-day vulnerabilities, unpatched security problems, including unsupported programs, outdated operating systems, and third-party software.

Commentaires

You are welcome to share your ideas with us in comments!