XnView TIFF Image Processing Heap Overflow

2012.07.26
Risk: High
Local: No
Remote: Yes
CWE: CWE-119

######################### Application: XnView TIFF Image Processing Heap Overflow Platforms: Windows Secunia: SA48666 {PRL}: 2012-15 Author: Francis Provencher (Protek Research Lab's) Website: http://www.protekresearchlab.com/ Twitter: @ProtekResearch ######################### 1) Introduction 2) Report Timeline 3) Technical details 4) The Code ##################################################################################### =============== 1) Introduction =============== XnView is a cross-platform image viewer used for viewing, converting, organising and editing graphical & video files. It is free of charge for private, educational and non-profit organisations. For commercial use and distribution, the user must register the program. It is popular with users as it provides features normally found only in commercial image viewers. (http://en.wikipedia.org/wiki/XnView) ######################### ============================ 2) Report Timeline ============================ 2012-05-15 Vulnerability reported to Secunia 2012-06-21 Vendor disclose patch ######################### ============================ 3) Technical details ============================ Insufficient validation when decompressing SGI32LogLum compressed TIFF images can be exploited to cause a heap-based buffer overflow. The vulnerabilities are confirmed in version 1.98.8. Other versions may also be affected ######################### =========== 4) The Code =========== http://protekresearchlab.com/exploits/PRL-2012-15.tif http://www.exploit-db.com/sploits/19338.tif

References:

http://www.protekresearchlab.com/index.php?option=com_content&view=article&id=49
http://www.protekresearchlab.com/index.php?option=com_content&view=article&id=48
http://www.exploit-db.com/exploits/19338
http://www.exploit-db.com/exploits/19337
http://secunia.com/advisories/48666
http://newsgroup.xnview.com/viewtopic.php?f=35&t=25858


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top