CVE-2025-53816
7-Zip 脆弱性の分析と軽減

概要

7-Zip, a popular file archiver with high compression capabilities, was found to contain a critical memory corruption vulnerability (CVE-2025-53816) affecting all versions prior to 25.0.0. The vulnerability was discovered by Jaroslav Lobačevski from GitHub Security Lab and was assigned a CVSS score of 5.5 (Medium severity). The issue was identified on April 24, 2025, acknowledged on April 29, and subsequently fixed in version 25.0.0 released on July 5, 2025 (GitHub Security Lab, Cybersecurity News).

技術的な詳細

The vulnerability is a heap-based buffer overflow (CWE-122) in the RAR5 decoder implementation, specifically in the NCompress::NRar5::CDecoder component. The flaw occurs when the software attempts to recover from corrupted archive data by filling damaged sections with zeros. The root cause is a miscalculation of the rem value during memory zeroing operations, where MyZeroMemory(window + winPos, (sizet)rem) is called with an incorrectly calculated rem parameter. The lzEnd variable, which influences the calculation, depends on the size of previous items in the archive and can be controlled by attackers ([GitHub Security Lab](https://securitylab.github.com/advisories/GHSL-2025-0587-Zip/)).

影響

While the vulnerability is unlikely to lead to arbitrary code execution, it poses significant risks for denial-of-service attacks. The flaw allows attackers to write zeros beyond the allocated heap buffer, potentially corrupting adjacent memory regions and causing application crashes. Testing demonstrated that specially crafted RAR5 files could trigger heap buffer overflows, with one proof-of-concept causing a write of 9,469 bytes beyond the allocated buffer (GitHub Security Lab, Cybersecurity News).

軽減策と回避策

The vulnerability has been fixed in 7-Zip version 25.0.0. Users and organizations are strongly recommended to upgrade to this version or later. Since 7-Zip lacks automatic update functionality, users must manually download and install the latest version from the official website. Organizations processing untrusted archive files should implement additional security measures, including restricting access to potentially malicious RAR5 archives and deploying comprehensive file validation before processing (Cybersecurity News).

関連情報


ソースこのレポートは AI を使用して生成されました

関連 7-Zip 脆弱 性:

CVE 識別子

重大度

スコア

テクノロジー

コンポーネント名

CISA KEV エクスプロイト

修正あり

公開日

CVE-2025-11001HIGH7
  • 7-Zip7-Zip
  • 7zip
いいえはいNov 19, 2025
CVE-2025-53817MEDIUM5.5
  • 7-Zip7-Zip
  • p7zip-doc
いいえはいJul 17, 2025
CVE-2025-53816MEDIUM5.5
  • 7-Zip7-Zip
  • p7zip-rar
いいえはいJul 17, 2025
CVE-2025-55188LOW3.6
  • 7-Zip7-Zip
  • 7zip
いいえはいAug 08, 2025
CVE-2022-47112LOW3.3
  • 7-Zip7-Zip
  • 7zip
いいえはいApr 19, 2025

無料の脆弱性評価

クラウドセキュリティポスチャーのベンチマーク

9つのセキュリティドメインにわたるクラウドセキュリティプラクティスを評価して、リスクレベルをベンチマークし、防御のギャップを特定します。

評価を依頼する

パーソナライズされたデモを見る

実際に Wiz を見てみませんか?​

"私が今まで見た中で最高のユーザーエクスペリエンスは、クラウドワークロードを完全に可視化します。"
デビッド・エストリックCISO (最高情報責任者)
"Wiz を使えば、クラウド環境で何が起こっているかを 1 つの画面で確認することができます"
アダム・フレッチャーチーフ・セキュリティ・オフィサー
"Wizが何かを重要視した場合、それは実際に重要であることを私たちは知っています。"
グレッグ・ポニャトフスキ脅威および脆弱性管理責任者