"expose systems to remote attackers".
This is some terrible link bait and Tom's Hardware should be ashamed.
Anything that is at least tangentially connected to the technology, social media platforms, informational technologies and tech policy.
[Opinion] prefix
Opinion (op-ed) articles must use [Opinion] prefix before the title.
1. English only
Title and associated content has to be in English.
2. Use original link
Post URL should be the original link to the article (even if paywalled) and archived copies left in the body. It allows avoiding duplicate posts when cross-posting.
3. Respectful communication
All communication has to be respectful of differing opinions, viewpoints, and experiences.
4. Inclusivity
Everyone is welcome here regardless of age, body size, visible or invisible disability, ethnicity, sex characteristics, gender identity and expression, education, socio-economic status, nationality, personal appearance, race, caste, color, religion, or sexual identity and orientation.
5. Ad hominem attacks
Any kind of personal attacks are expressly forbidden. If you can't argue your position without attacking a person's character, you already lost the argument.
6. Off-topic tangents
Stay on topic. Keep it relevant.
7. Instance rules may apply
If something is not covered by community rules, but are against lemmy.zip instance rules, they will be enforced.
!globalnews@lemmy.zip
!interestingshare@lemmy.zip
Icon attribution | Banner attribution
If someone is interested in moderating this community, message @brikox@lemmy.zip.
"expose systems to remote attackers".
This is some terrible link bait and Tom's Hardware should be ashamed.
"a crafted archive can escape its intended extraction directory and write files to other locations on the system. When chained, this can escalate to full code execution under the same privileges as the user"
To be clear, you want Tom's Hardware to downplay the severity of this situation?
This is not a remote code exploit that makes you vulnerable simply because 7zip is installed, which is the implication of the headline.
So this is a linkbait headline, divorced from the reality of the situation.
Which is the bit I take issue with.
The article itself describes not only the actual problem, but the broader problem of this being a known fixed problem which won't be automatically addressed for most windows users.
Side note, winget is not bad as far as centralised package management goes for windows, and why I'm personally not at risk for this already long addressed 7zip issue.
Technically not a lie but still far from the truth. But it is still true that anyone using 7zip to extract archives downloaded from the internet should update.
This sounds great for social engineering but yeah it's a stretch to say exposed to remote attackers like it's 0click... and I'd imagine detection would be pretty easy if you monitor filewrites to sensitive locations or sensitive file extensions by 7zip.
POCs are described elsewhere as a pretty standard Get malicious file run through 7zip >>> Directory Traversal by spamming /../ >>> Drop a malicious DLL in System32 >>> Scheduled task to run the payload.
I bet this will be mostly just for shitting RATs onto machines via social engineering.Though there might be a nastier opportunity if a server is accepting zipped archives and running automated 7zip commandline extraction via script. That could get ugly.
Yeah, sure, and the remote hackers access my system how exactly to run 7-Zip? Do they use the well know ZIP-socket Linux exposes, designed to unzip stuff for random people in case of archival emergencies?