#evilWinRaR😈#Windows 7🔥#KaliLinux 2019.1😇✔️💯 [CVE-2018-20250]
MunYa
#evilWinRaR #Windows 7 #KaliLinux 2019.1 Evil WinRar Windows Kali-Linux 2019.1 https://github.com/manulqwerty/Evil-WinRAR-Gen Generator of malicious Ace files for WinRAR [less than:] 5.70 beta 1
http://www.mediafire.com/file/bbvme7tskx06j0y/Evil-WinRAR-Gen.zip/file
WinRAR is a trialware file archiver utility for #Windows, developed by Eugene Roshal of win.rar GmbH. It can create and view archives in RAR or ZIP file formats, and unpack numerous archive file formats. #Solution: #Patch & #Update: #WinRAR is a powerful archive manager. It can backup your data and reduce the size of email attachments, decompress #RAR, #ZIP and other files downloaded from Internet and create new archives in RAR and ZIP file format. You can try WinRAR https://www.rarlab.com/download.htm
https://nvd.nist.gov/vuln/detail/CVE-2018-20250 Current Description In #WinRAR versions prior to and including 5.61, There is path traversal #vulnerability when crafting the filename field of the ACE format (in UNACEV2.dll). When the filename field is manipulated with specific patterns, the destination (extraction) folder is ignored, thus treating the filename as an absolute path.
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20250 In WinRAR versions prior to and including 5.61, There is path traversal vulnerability when crafting the filename field of the ACE format (in UNACEV2.dll). When the filename field is manipulated with specific patterns, the destination (extraction) folder is ignored, thus treating the filename as an absolute path.
#Attackers #Exploiting #WinRAR #UNACEV2.DLL #Vulnerability (CVE-2018-20250)
Earlier this month Check Point Research reported discovery of a 19 year old code execution vulnerability in the wildly popular WinRAR compression tool. Rarlab reports that that are over 500 million users of this program. While a patched version, 5.70, was released on February 26, attackers are releasing #exploits in an effort to reach #vulnerable systems before they can be patched.
One recent example piggybacks on a bootlegged copy of Ariana Grande’s hit album “Thank U, Next” with a file name of “Ariana_Grande-thank_u,next(2019)[320].rar”
When a vulnerable version of #WinRAR is used to extract the contents of this archive, a malicious #payload is created in the Startup folder behind the scenes. User Account Control (#UAC) does not apply, so no alert is displayed to the user. The next time the system restarts, the malware is run.
#winrar winrar
#virtualbox virtual box
#msf msf
#Music: Skrillex_Reptile #Music: MISCRIS & FWØSH - Take Over Control #Music: KVPV - Nevermind (Radio Mix)
CVE-2018-20250 CVE 2018 20250
43749578 Bytes