https://www.theregister.co.uk/2018/04/04/microsoft_windows_defender_rar_bug/
A remote-code execution vulnerability in Windows Defender – a flaw that can be exploited by malicious .rar files to run malware on PCs – has been traced back to an open-source archiving tool Microsoft adopted for its own use.
[...] Apparently, Microsoft forked that version of unrar and incorporated the component into its operating system's antivirus engine. That forked code was then modified so that all signed integer variables were converted to unsigned variables, causing knock-on problems with mathematical comparisons. This in turn left the software vulnerable to memory corruption errors, which can crash the antivirus package or allow malicious code to potentially execute.
(Score: 4, Touché) by All Your Lawn Are Belong To Us on Monday April 09 2018, @10:39PM (2 children)
Your words not strict form
Overflow memory blow
You let bad code in
This sig for rent.
(Score: 2) by Bot on Tuesday April 10 2018, @12:06PM (1 child)
You are just jealous:
unlike your haiku, mine brings
tears to the eye
Account abandoned.
(Score: 3, Informative) by All Your Lawn Are Belong To Us on Wednesday April 11 2018, @05:59PM
My head, shamed, contrite.
Even bad smelling roses
don't promote systemd
This sig for rent.