It seems that you're using an outdated browser. Some things may not work as they should (or don't work at all).
We suggest you upgrade newer and better browser like: Chrome, Firefox, Internet Explorer or Opera

×
Thanks, updated!
Thanks for the heads up broskie! +1 you saved me from a world of hurt.

was on 18.1.0 I am amazed they went to 18.5 right away.
Post edited May 05, 2018 by DreamedArtist
I guess I don't get it... how can software that's used locally be a security exploit?
avatar
Splatsch: Hi just crossed this info on the web, and only wanted to relay it here in case people are using it and may not see this info.
So a security flaw has been detected, but it as been corrected in the last version, so if you use 7zip, update it as soon as possible !

The article :
https://www.pcgamer.com/a-serious-security-vulnerability-has-been-found-in-7-zip/

The site of 7zip :
https://www.7-zip.org/

That's all :)
Thanks for the notice!
avatar
teceem: I guess I don't get it... how can software that's used locally be a security exploit?
What you're uncompressing can fire off instructions to do things like run other programs or create hidden accounts in your Windows install.

Or at least that's how it looks to me when I skim the original post:

https://landave.io/2018/05/7-zip-from-uninitialized-memory-to-remote-code-execution/

Stressing that I skimmed it.

What concerns me though looking at that page, the 7zip folks ignored the original report and didn;t acknowledge it until the CVE was filed.
avatar
teceem: I guess I don't get it... how can software that's used locally be a security exploit?
In the case of stuff like 7z:

Create an archive with malicious code and a way that unpacking that archive crashes 7z in a way that the next instruction pointer of the CPU points at the malicious code already in memory. Exploits like this are really the bread-and-butter of hacking. Stuff like that has hit multiple archivers in the past, image viewers, anti-virus (also often with an unpacking crash hack - and esp. malicious since AV has system rights).

Also most rootings of game consoles worked with stuff like that: Controlled crashing of the original bootloader/OS to inject your own code.
avatar
teceem: I guess I don't get it... how can software that's used locally be a security exploit?
avatar
drmike: What you're uncompressing can fire off instructions to do things like run other programs or create hidden accounts in your Windows install.

Or at least that's how it looks to me when I skim the original post:

https://landave.io/2018/05/7-zip-from-uninitialized-memory-to-remote-code-execution/

Stressing that I skimmed it.

What concerns me though looking at that page, the 7zip folks ignored the original report and didn;t acknowledge it until the CVE was filed.
Thanks for the explanation! I can see now why it didn't make sense to me; I don't just unpack any zip file. I'm not saying I'm perfect and that nothing can happen to me - but they make it sound so 'dramatic' because it's aimed at anyone.
Thanks for the headsup. Unlike "the name of *thefile* has been ~UPDATED~ to *the_file* featuring ~OVERLAY~" style updates, this is actually a real useful update :D
avatar
Splatsch: *snip*
Thanks for the tip.
low rated
avatar
Tauto: I said ''or so ago'':)
avatar
drmike: I know. God forbid I suggest that the mighty and all powerful Tauto makes such a mistake here on the forums.




avatar
Themken:
avatar
drmike:
You may *bow*.
avatar
DreamedArtist: was on 18.1.0 I am amazed they went to 18.5 right away.
Nope, it was 18.01 and now 18.05 :p
avatar
DreamedArtist: was on 18.1.0 I am amazed they went to 18.5 right away.
avatar
triock: Nope, it was 18.01 and now 18.05 :p
Close enough haha
avatar
misteryo: hanks!
tom? ;)
thanks for the info!
Just noticed they have v9.3 alpha here where I'm working this weekend back from 2012.

Guess I better update it for them. I'm such a nice guy. :)