A critical security flaw, identified as CVE-2024-11477, has been discovered in 7-Zip, a widely used file compression and archiving tool. The vulnerability lies within the Zstandard decompression function, where improper validation of user-provided input can lead to an integer underflow. This flaw could enable attackers to execute arbitrary code within the application's process, posing a serious threat to affected systems. Discovered by Nicholas Zubrisky from Trend Micro Security Research, the vulnerability has been rated with a CVSS score of 7.8, reflecting its high exploitability. Attackers can leverage this issue by tricking users into opening maliciously crafted archive files, potentially leading to remote code execution. If successfully exploited, the consequences could include unauthorized access to sensitive data or full control of the targeted system. While exploiting this vulnerability requires user interaction, the methods may vary depending on the implementation of the Zstandard decompression function. To mitigate the risk, users are urged to update 7-Zip to the latest version as soon as possible to safeguard their systems against potential threats.
Researchers published a proof-of-concept called Brash that exploits an architectural flaw in Chromium’s Blink rendering engine. By performing unconstrained, high-frequency update...
A sophisticated multilingual phishing campaign has recently been uncovered targeting financial institutions and government organisations across East and Southeast Asia. The attacke...
AzureHound an open-source reconnaissance tool originally intended for red-team operations is being exploited by threat actors to automatically map out Microsoft Entra ID (formerly ...