7-Zip flaw enables code smuggling with manipulated archives

Attackers can use manipulated archives to try to inject malicious code into 7-Zip users. An update is available.

listen Print view
File on the computer screen distributes viruses and malware

(Image: Bild erstellt mit KI in Bing Designer durch heise online / dmk)

2 min. read

The 7-Zip compression tool contains a security vulnerability that allows attackers from the network to infiltrate and execute malicious code with manipulated archives. A software update is available. 7-Zip users must take action and download and install it themselves.

The security bulletin from Trend Micro's Zero-Day Initiative discusses the vulnerability. According to this, an integer underflow can occur when decompressing a Zstandard compressed file before the code writes to memory. The error is based on inadequate checking of user-supplied data and can be misused to smuggle in and launch malicious code (CVE-2024-11477, CVSS 7.8, risk"high").

If attackers convince 7-Zip users to open carefully prepared archives from the network –, for example in the form of an email attachment or a shared file –, they can plant malware on them. The Zstandard format is used more frequently, especially under Linux, and is available as an option for Btrfs, SquashFS or OpenZFS. It is said to provide similar compression to Deflate (e.g. via zlib or for HTTP compression), but is faster, especially when it comes to decompression.

Videos by heise

IT researchers at the ZDI discovered the vulnerability in June and reported it to 7-Zip. With version 24.07, the developers have patched the security leak. Version 24.08 is currently available for download on the 7-Zip website.

As 7-Zip does not have an integrated update mechanism, users of the software must take action themselves and download and install the new version. If you do not need any special features of the 7-Zip software, you can also uninstall it. Windows File Explorer is now able to create and unzip 7-Zip files by default.

(dmk)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.