IrfanView TIFF Image Processing Buffer Overflow Vulnerability

2012.10.28
Risk: High
Local: Yes
Remote: No
CWE: CWE-119


CVSS Base Score: 4.3/10
Impact Subscore: 2.9/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: None
Integrity impact: None
Availability impact: Partial

############### Application: IrfanView TIFF Image Processing Buffer Overflow Vulnerability Platforms: Windows Exploitation: Remote code execution Secunia Number: SA47065 {PRL}: 2011-10 Author: Francis Provencher (Protek Research Lab's) Website: http://www.protekresearchlab.com/ Twitter: @ProtekResearch ##################################################################################### 1) Introduction 2) Timeline 3) Technical details 4) PoC ##################################################################################### =============== 1) Introduction =============== IrfanView is a freeware/shareware image viewer for Microsoft Windows that can view, edit, and convert image files and play video/audio files. It is noted for its small size, speed, ease of use, and ability to handle a wide variety of graphic file formats, and has some image creation and painting capabilities. The software was first released in 1996. IrfanView is free for non-commercial use; commercial use requires paid registration. ##################################################################################### ============ 2) Timeline ============ 2011-12-02 - Vulnerability reported to vendor 2011-12-20 - Coordinated public release of advisory ##################################################################################### ================= 3) Technical details ================= The vulnerability is caused due to an error when processing TIFF images with certain "Rows Per Strip" and "Samples Per Pixel" values, which can be exploited to cause a heap-based buffer overflow by tricking a user into opening a specially crafted TIFF image file. ##################################################################################### ============= 4) The Code ============= http://www.exploit-db.com/sploits/18257.tif http://www.protekresearchlab.com/exploits/PRL-2011-10.tif

References:

http://xforce.iss.net/xforce/xfdb/71891
http://www.protekresearchlab.com/index.php?option=com_content&view=article&id=30&Itemid=30
http://www.osvdb.org/77957
http://www.irfanview.com/history_old.htm
http://www.exploit-db.com/exploits/18257
http://secunia.com/advisories/47065


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2021, cxsecurity.com

 

Back to Top