{"id":3496,"date":"2023-08-23T10:27:49","date_gmt":"2023-08-23T15:27:49","guid":{"rendered":"https:\/\/cert.pa\/?p=3496"},"modified":"2023-10-25T09:32:19","modified_gmt":"2023-10-25T14:32:19","slug":"csirt-panama-aviso-2023-08-23-informacion-sobre-la-vulnerabilidad-en-winrar","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=3496","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2023-08-23 Informaci\u00f3n sobre la vulnerabilidad en WinRAR"},"content":{"rendered":"\n<p>CSIRT Panam\u00e1 Aviso 2023-08-23 Informaci\u00f3n sobre la vulnerabilidad en WinRAR<br>Gravedad: Alta<br>Fecha de publicaci\u00f3n: Ago. 02, 2023<br>https:\/\/www.win-rar.com\/<\/p>\n\n\n<p><strong>I. Descripci\u00f3n<\/strong><br \/>Se Report\u00f3 una vulnerabilidad de riesgo alto en WinRAR<\/p>\n<p style=\"text-align: left;\"><strong>II. Detalles<\/strong><br \/>Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en<br \/>instalaciones afectadas de RARLAB WinRAR. Se requiere la interacci\u00f3n del<br \/>usuario para explotar esta vulnerabilidad, ya que el objetivo debe visitar una<br \/>p\u00e1gina maliciosa o abrir un archivo malicioso.<\/p>\n<p style=\"text-align: left;\">La falla espec\u00edfica existe en el procesamiento de vol\u00famenes de recuperaci\u00f3n.<br \/>El problema se debe a la falta de una validaci\u00f3n adecuada de los datos<br \/>proporcionados por el usuario, lo que puede provocar un acceso a la memoria m\u00e1s<br \/>all\u00e1 del final de un b\u00fafer asignado. Un atacante puede aprovechar esta vulnerabilidad<br \/>para ejecutar c\u00f3digo en el contexto del proceso actual.<\/p>\n<p><!-- \/wp:post-content --><!-- wp:paragraph --><\/p>\n<p><strong>III. Referencia a soluciones, herramientas e informaci\u00f3n<\/strong><\/p>\n<p>Win.rar recomienda instalar la \u00faltima versi\u00f3n de WinRAR 6.23.<br \/>Encontrar\u00e1 la \u00faltima versi\u00f3n aqu\u00ed: <a href=\"http:\/\/www.win-rar.com\/download.html\">www.win-rar.com\/download.html<\/a><\/p>\n<p><strong>Mas informaci\u00f3n sobre la vulnerabilidad:<\/strong><br \/><a href=\"https:\/\/www.win-rar.com\/singlenewsview.html?&amp;L=0&amp;tx_ttnews%5Btt_news%5D=232&amp;cHash=c5bf79590657e32554c6683296a8e8aa\">https:\/\/www.win-rar.com\/singlenewsview.html?&amp;L=0&amp;tx_ttnews%5Btt_news%5D=232&amp;cHash=c5bf79590657e32554c6683296a8e8aa<\/a><\/p>\n<p><a href=\"https:\/\/www.zerodayinitiative.com\/advisories\/ZDI-23-1152\/\">https:\/\/www.zerodayinitiative.com\/advisories\/ZDI-23-1152\/<\/a><\/p>\n<p><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-40477\">https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-40477<\/a><\/p>\n<p><a href=\"https:\/\/www.csirt.gob.cl\/vulnerabilidades\/9vsa23-00884-01\/\">https:\/\/www.csirt.gob.cl\/vulnerabilidades\/9vsa23-00884-01\/<\/a><\/p>\n<p><!-- \/wp:paragraph --><!-- wp:paragraph --><\/p>\n<p><strong>IV. Informaci\u00f3n de contacto<\/strong><br \/>CSIRT PANAMA<br \/>Computer Security Incident Response Team Autoridad Nacional para la Innovacion<br \/>Gubernamental<br \/>E-Mail: info@cert.pa<br \/>Phone: +507 520-CERT (2378)<br \/>Web: https:\/\/cert.pa<br \/>Twitter: @CSIRTPanama<br \/>Facebook: http:\/\/www.facebook.com\/CSIRTPanama<br \/>Key ID: 16F2B124<\/p>\n<p><!-- \/wp:paragraph --><\/p>","protected":false},"excerpt":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2023-08-23 Informaci\u00f3n sobre la vulnerabilidad en WinRARGravedad: AltaFecha de publicaci\u00f3n: Ago. 02, 2023https:\/\/www.win-rar.com\/ I. Descripci\u00f3nSe Report\u00f3 una vulnerabilidad de riesgo alto en WinRAR II. DetallesEsta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo&#8230;<\/p>\n","protected":false},"author":4,"featured_media":3497,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[76,72,73,68],"class_list":["post-3496","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad","tag-actualizaciones","tag-avisos-de-seguridad","tag-parches","tag-vulnerabilidades"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/3496","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3496"}],"version-history":[{"count":3,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/3496\/revisions"}],"predecessor-version":[{"id":3501,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/3496\/revisions\/3501"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/3497"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3496"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3496"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3496"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}