IrfanView TIF Image Decompression Buffer Overflow Vulnerability

2012-11-14 / 2012-11-18
Risk: High
Local: Yes
Remote: No
CWE: CWE-119


CVSS Base Score: 6.8/10
Impact Subscore: 6.4/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

############### Application: IrfanView TIF Image Decompression Buffer Overflow Vulnerability Plateform: Windows Version: The vulnerabilities are confirmed in version 4.33. Other versions may also be affected. Exploitation: Remote code execution Secunia Number: SA49856 {PRL}: 2012-31 Author: Francis Provencher (Protek Research Lab's) Website: http://www.protekresearchlab.com/ Twitter: @ProtekResearch ############### 1) Introduction 2) Timeline 3) Technical details 4) PoC ############### =============== 1) Introduction =============== IrfanView is a freeware/shareware image viewer for Microsoft Windows that can view, edit, and convert image files and play video/audio files. It is noted for its small size, speed, ease of use, and ability to handle a wide variety of graphic file formats, and has some image creation and painting capabilities. The software was first released in 1996. IrfanView is free for non-commercial use; commercial use requires paid registration. ############### ============ 2) Timeline ============ 2012-07-11 - Vulnerability reported to secunia 2012-11-12 - Coordinated public release of advisory ############### ================= 3) Technical details ================= An error when processing JPEG compressed TIFF images can be exploited to cause a heap-based buffer overflow via a specially crafted "ImageWidth" value. ############### ============= 4) The Code ============= http://protekresearchlab.com/exploits/PRL-2012-31.tif

References:

http://protekresearchlab.com/exploits/PRL-2012-31.tif


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top