X
Tech

Patch plugs WinZip flaw

The popular Windows file compression tool has a critical security flaw that could open a door for a remote attacker.
Written by Ingrid Marson, Contributor
WinZip Computing has released a patch WinZip 9.0 Service Release 1, which it claims will resolve a buffer overflow issue.

WinZip warned last month of a security flaw in WinZip, its compression/decompression tool that runs on the Windows platform. Security firm Secunia has just rated the flaw as "highly critical", the fourth highest out of its five severity levels.

WinZip versions 3.x, 6.x, 7.x, 8.x and 9.x contain vulnerabilities that could allow a remote attacker to execute malicious code. The problem is caused by a flaw in the way WinZip handles command-line inputs, and can be exploited by a malicious hacker to cause a buffer overflow.

The patch contains other changes including the addition of warning messages in some situations. For example, if a user double-clicks on an .EXE file compressed within a Zip file, WinZip will warn that the compressed file could potentially contain a virus.

The company recommends on its Web site that all users upgrade to version 9.0 to get the fix. Registered users can upgrade at no cost. New users can use the software free of charge for 21 days, then would have to pay a $29 license fee to continue using it.

The company said it was not aware of the vulnerability having been exploited in the wild when it released the patch.

This news comes only a couple of weeks after warnings that a flaw in Winamp, a media application run on Windows, has been exploited by to infect people's computers with spyware. When Secunia released the initial advisory no patch was available and it advised that users switch to another product.

The flaw has now been patched and the latest Secunia advisory, updated on Monday, advises users upgrade to Winamp 5.05.

Editorial standards