AbsoluteSix
  • Communities
  • Create Post
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 months ago

7-Zip Zero-Day Exploit Allegedly Leaked Online

cybersecuritynews.com

external-link
message-square
3
fedilink
49
external-link

7-Zip Zero-Day Exploit Allegedly Leaked Online

cybersecuritynews.com

Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 4 months ago
message-square
3
fedilink
Just a moment...
cybersecuritynews.com
external-link
alert-triangle
You must log in or register to comment.
  • themelm@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    24
    ·
    4 months ago

    The dev appears to think this is a fake exploit generated by LLM/AI

    https://sourceforge.net/p/sevenzip/bugs/2539/

    • wizardbeard@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      7
      ·
      4 months ago

      Based off a small technicality with one of the comments in the code. The “function” referenced is actually a macro.

      • HackerJoe@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        4
        ·
        4 months ago

        It’s nonsense:

        https://xcancel.com/Seifreed/status/1874245336291488179

        The LZMA implementation already validates bounds elsewhere (bufLimit). If p->buf exceeds its limit, the program aborts the decompression safely.
        🚫 The claim of unchecked memory access is baseless.

Cybersecurity@sh.itjust.works

cybersecurity@sh.itjust.works

Subscribe from Remote Instance

Create a post
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: !cybersecurity@sh.itjust.works

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

  • Be respectful. Everyone should feel welcome here.
  • No bigotry - including racism, sexism, ableism, homophobia, transphobia, or xenophobia.
  • No Ads / Spamming.
  • No pornography.

Community Rules

  • Idk, keep it semi-professional?
  • Nothing illegal. We’re all ethical here.
  • Rules will be added/redefined as necessary.

If you ask someone to hack your “friends” socials you’re just going to get banned so don’t do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !securitynews@infosec.pub !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub

Notable mention to !cybersecuritymemes@lemmy.world

Visibility: Public
globe

This community can be federated to other instances and be posted/commented in by their users.

  • 21 users / day
  • 736 users / week
  • 1.6K users / month
  • 4.78K users / 6 months
  • 1 local subscriber
  • 7.17K subscribers
  • 2.37K Posts
  • 3.93K Comments
  • Modlog
  • mods:
  • Kid@sh.itjust.works
  • Lanky_Pomegranate530@midwest.social
  • BE: 0.19.10
  • Modlog
  • Instances
  • Docs
  • Code
  • join-lemmy.org