Cyber Security News

Windows 11 Compression Features Pose libarchive Security Threats

Microsoft’s ongoing efforts to enhance user experience in Windows 11 have introduced native support for a variety of new archive formats via the KB5031455 update.

While these changes have streamlined user workflows, they have also inadvertently opened Pandora’s box in the realm of cybersecurity, linking the operating system to potential vulnerabilities stemming from its reliance on libarchive, an open-source library used for handling multiple archive file formats.

Windows 11 Compression Expansion

Before October 2023, Windows 11 natively supported only ZIP files, categorized as “Compressed (zipped) Folder.”

Windows 11 Compression Expansion

The KB5031455 update expanded this feature to include 11 additional formats, including RAR, 7z, and TAR.

The changes were welcomed by users who no longer needed third-party tools like WinRAR or 7-Zip to handle these formats.

Underneath this user-friendly facade lies a technical shift. File Explorer now uses two distinct mechanisms: zipfldr.dll for handling ZIP files and archiveint.dll, which integrates libarchive, for managing the newly supported formats.

While libarchive is a robust library tested across platforms like Linux, macOS, and BSD, it has introduced significant security concerns.

libarchive Vulnerabilities

Libarchive, despite its maturity and extensive fuzz testing through Google’s OSS-Fuzz program, has shown cracks in its armor.

Recent research uncovered several serious security vulnerabilities tied to its use in Windows 11, including those already patched by Microsoft and others that persisted due to delays in addressing them upstream in libarchive.

Key Vulnerabilities Discovered:

  1. CVE-2024-26185: A loophole allowed arbitrary file write and delete operations when extracting files from archives in File Explorer.
A loophole allowed arbitrary file

Although it required precise user interaction, such as navigating deep archive structures and opening specific files, the exploit underscored poor filename filtering.

  1. CVE-2024-38165: Microsoft’s initial patch for CVE-2024-26185 was bypassed.
Exploiting Windows

By exploiting Windows’ handling of absolute paths in archives, attackers could write temporary files outside their intended directories, potentially enabling data manipulation.

  1. CVE-2024-26256: This severe Remote Code Execution (RCE) vulnerability stemmed from a heap buffer overflow in libarchive while processing RAR files. Exploiting this flaw allowed hackers to execute malicious code, putting users at significant risk.
  2. RCEs and File Confusion Bugs: Researchers even found that libarchive could mistakenly identify file formats, leading to further vulnerabilities. For instance, a low-compression RAR file containing a ZIP signature was misclassified, exposing users to potential attacks.

The integration of libarchive has significantly expanded the software’s attack surface.

Researchers noted that, in theory, Windows 11 could support over 91 decillion (10^33) archive format combinations due to libarchive’s ability to chain filters and formats.

Error

While this flexibility theoretically enables broad compatibility, it also dramatically increases the likelihood of unanticipated security flaws.

Despite continuous fuzz testing, libarchive’s oversight of certain file formats and its reliance on CRC checks posed challenges for automated vulnerability detection.

Even after vulnerabilities like CVE-2024-20696 and CVE-2024-20697 were found, a disconnect between Microsoft and the libarchive maintainers led to a “Half-day” scenario, where vulnerabilities patched in Microsoft’s fork of libarchive went unaddressed upstream for months.

The lack of immediate CVE issuance and public awareness further delayed the deployment of critical patches, leaving downstream users and projects vulnerable.

The delay highlights the risks inherent in the fragmented nature of open-source software development when integrated into proprietary systems.

As Windows 11 users enjoy the convenience of handling multiple archive formats directly in File Explorer, it is crucial to remember that such luxury must come with vigilance.

Keeping systems up to date and monitoring emerging vulnerabilities remain essential steps for mitigating risks in an ever-evolving cybersecurity landscape.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Divya

Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

Hackers Rapidly Adopt ClickFix Technique for Sophisticated Attacks

In recent months, a sophisticated social engineering technique known as ClickFix has gained significant traction…

11 hours ago

Supply Chain Attack Targets 23,000 GitHub Repositories

A critical security incident has been uncovered involving the popular GitHub Action tj-actions/changed-files, which is…

11 hours ago

Beware! Malware Hidden in Free Word-to-PDF Converters

The FBI has issued a warning about a growing threat involving free file conversion tools,…

11 hours ago

MassJacker Clipper Malware Targets Users Installing Pirated Software

A recent investigation has uncovered previously unknown cryptojacking malware, dubbed MassJacker, which primarily targets users…

11 hours ago

SocGholish Exploits Compromised Websites to Deliver RansomHub Ransomware

SocGholish, a sophisticated malware-as-a-service (MaaS) framework, has been identified as a key enabler in the…

11 hours ago

New Steganographic Malware Hides in JPG Files to Deploy Multiple Password Stealers

A recent cybersecurity threat has emerged in the form of a steganographic campaign that uses…

11 hours ago