this post was submitted on 30 Dec 2024
48 points (92.9% liked)

Cybersecurity

5885 readers
32 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities [email protected] [email protected] [email protected] [email protected] [email protected]

Notable mention to [email protected]

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] themelm 24 points 3 days ago (1 children)

The dev appears to think this is a fake exploit generated by LLM/AI

https://sourceforge.net/p/sevenzip/bugs/2539/

[–] [email protected] 7 points 3 days ago (1 children)

Based off a small technicality with one of the comments in the code. The "function" referenced is actually a macro.

[–] HackerJoe 4 points 1 day ago

It's nonsense:

https://xcancel.com/Seifreed/status/1874245336291488179

The LZMA implementation already validates bounds elsewhere (bufLimit). If p->buf exceeds its limit, the program aborts the decompression safely.
🚫 The claim of unchecked memory access is baseless.