CVE-2024-11477: 7-Zip Remote Code Execution
Affected versions on 7-zip are vulnerable to remote code execution by a remote attacker. Attackers are able to cause an integer underflow and write to memory. The vulnerability was reported to 7-Zip in June 2024.
Technical Information
Referenced as CVE-2024-11477. 7-zip <24.07 is vulnerable to an integer underflow (we dive into this below) which can lead to remote code execution via a buffer overflow. This is due to improper user input handling. The Zstandard decompression was implemented in a way that allows for a remote attacker to deliver a specially crafted 7-zip file, which, when decompressed, may execute arbitrary code on the victim’s endpoint.
There are currently no known exploits that exist in the wild, and threat intelligence does not indicate that this is being actively exploited yet. It is expected that once a working exploit is developed that exploitation cases will increase.
What is an Integer Underlow?
An integer underflow occurs when an assigned variable is given a value that passes the minimum value that can be assigned to that variable. This is due to the way that memory handles values in binary.
For example, a variable number is the size of 1 byte (8 bits) which only allows for a number to go as low as -128, or 10000000 in binary notation. The most significant bit is reserved to signify whether the number is positive or negative, 1 for negative and 0 positive. Therefore, the lowest possible value is -128 as that would set all bits to 0 excluding the signed bit.
If an operation occurs on number that results in the value being lower than -128 (e.g. -129), then an underflow will occur and the value will be set to maximum value available for the type (e.g. 127) as the signed bit is flipped for the logic of the operation to be maintained. On it’s own an underflow is not exploitable, yet this can allow a threat actor to bypass checks and perform a buffer overflow.
Let’s have a look at the code changes in the 7-zip project that show where the integer underflow occurred. Below is a screenshot of the project commit history (you can view it yourself here). The red indicates old lines of code, green indicates new lines of code.
We can see in the original line 1311 that the code used to assign a Byte constant to a pointer declared in 1310. This type was changed to an unsigned type as this stops negative values being assigned to ptr. Next, we see that the developers added 2 lines which handle the exception created by a miss assigned value, whereas previously the application would simply crash. This would mitigate against an attacker overflowing the stack buffer and writing to memory.
Essentially, the previous version would allow an threat actor to supply a value to the sym variable that would underflow the value and cause a buffer overflow. This would allow them to write to memory and provide arbitrary commands for exploitation.
Mitigation
Fix is applied to 7-zip versions 24.07 and up. It is recommended to upgrade to these versions. Ensure that users are educated on the risks associated with files that come from unknown sources.
If you require assistance with vulnerability management, security operations, or compliance please reach out to our team.
Ready to get started?
Find out how RightSec can help your organisation enhance
their cyber security resilience.
Cyber Security Services

Cyber Strategy and Consulting
Expert guidance on how to safeguard your organisations valuable assets and reputation.

Managed Security Services
RightSec's 24/7 managed security services will give your business the visibility and coverage needed.

Penetration Testing and Red Teaming
Identify security weaknesses and take proactive measures to improve your security posture.

Governance, Risk and Compliance
Assess your organisation's resources and validate the adequacy of your capabilities to manage Cyber Risk.

Digital Forensics and Incident Response
RightSec’s IR team is available round the clock to provide immediate assistance to on-going incidents.

Team Augmentation
Augment your team with RightSec Cyber Security experts, to meet the growing demand of Cyber Security.
Auditing and Gap Analysis
We will help you evaluate your existing security controls and identify any vulnerabilities that may exist.
Security Awareness and Training
Our methodology leverages decades of experience in identifying and analysing threats, tailoring campaigns to educate stakeholders and users on threats an organisation may be facing.
References
https://www.zerodayinitiative.com/advisories/ZDI-24-1532/
https://nvd.nist.gov/vuln/detail/CVE-2024-11477
https://cwe.mitre.org/data/definitions/191.html
https://www.infosecinstitute.com/resources/secure-coding/what-is-is-integer-overflow-and-underflow/
https://github.com/ip7z/7zip/commit/a7a1d4a241492e81f659a920f7379c193593ebc6


