CVE-2024-8811

CVSS V2 None CVSS V3 None
Description
WinZip Mark-of-the-Web Bypass Vulnerability. This vulnerability allows remote attackers to bypass the Mark-of-the-Web protection mechanism on affected installations of WinZip. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of archive files. When opening an archive that bears the Mark-of-the-Web, WinZip removes the Mark-of-the-Web from the archive file. Following extraction, the extracted files also lack the Mark-of-the-Web. An attacker can leverage this vulnerability to execute arbitrary code in the context of the current user. Was ZDI-CAN-23983.
Overview
  • CVE ID
  • CVE-2024-8811
  • Assigner
  • zdi
  • Vulnerability Status
  • PUBLISHED
  • Published Version
  • 2024-11-22T21:03:11.483Z
  • Last Modified Date
  • 2024-11-22T21:03:11.483Z
References
Reference URL Reference Tags
https://www.zerodayinitiative.com/advisories/ZDI-24-1234/ x_research-advisory
History
Created Old Value New Value Data Type Notes
2024-11-23 13:15:59 Added to TrackCVE