Windows Defender inspects a variety of different archive formats, among others RAR. Inspection of mpengine.dll revealed that the code responsible for processing RAR archives appears to be a forked and modified version of the original unrar code; given that it still processes the VMSF_UPCASE filter (which was removed in unrar 5.0), it seems that the code is derived from a version of unrar older or equal than 4.2.4. Interestingly, the issue discovered in CVE-2012-6706 (Sophos VMSF_DELTA, and in 2017 unrar) and other signedness issues in the RarVM::ExecuteStandardFilter function were fixed long ago (apparently without a report to upstream, most likely by simply turning the relevant variables from "signed" to "unsigned"). It appears that this blanket conversion from signed to unsigned ended up introducing a new vulnerability, though: From unrar 4.2.4 rarvm.cpp: case VMSF_RGB: { int DataSize=R[4],Width=R[0]-3,PosR=R[1]; byte *SrcData=Mem,*DestData=SrcData+DataSize; const int Channels=3; SET_VALUE(false,&Mem[VM_GLOBALMEMADDR+0x20],DataSize); if ((uint)DataSize>=VM_GLOBALMEMADDR/2 || PosR<0) break; for (int CurChannel=0;CurChannel