58 lines
No EOL
2 KiB
Text
58 lines
No EOL
2 KiB
Text
#####################################################################################
|
|
|
|
Application: IrfanView DJVU Image Processing Heap Overflow
|
|
Version: The vulnerability is confirmed in version 4.33. Other versions may also be affected
|
|
Plateform: Windows
|
|
Exploitation: Remote code execution
|
|
|
|
Secunia Number: SA49176
|
|
|
|
{PRL}: 2012-23
|
|
|
|
Author: Francis Provencher (Protek Research Lab's)
|
|
|
|
Website: http://www.protekresearchlab.com/
|
|
|
|
Twitter: @ProtekResearch
|
|
|
|
#####################################################################################
|
|
|
|
1) Introduction
|
|
2) Timeline
|
|
3) Technical details
|
|
4) PoC
|
|
|
|
|
|
#####################################################################################
|
|
|
|
===============
|
|
1) Introduction
|
|
===============
|
|
IrfanView is a freeware/shareware image viewer for Microsoft Windows that can view, edit, and convert image files
|
|
and play video/audio files. It is noted for its small size, speed, ease of use, and ability to handle a wide variety of graphic
|
|
file formats, and has some image creation and painting capabilities. The software was first released in 1996.
|
|
IrfanView is free for non-commercial use; commercial use requires paid registration.
|
|
#####################################################################################
|
|
|
|
============
|
|
2) Timeline
|
|
============
|
|
|
|
2012-05-15 - Vulnerability reported to secunia
|
|
2012-06-22 - Coordinated public release of advisory
|
|
|
|
#####################################################################################
|
|
|
|
=================
|
|
3) Technical details
|
|
=================
|
|
The vulnerability is caused due to an error when decompressing DjVu images
|
|
and can be exploited to cause a heap-based buffer overflow via a specially crafted file.
|
|
#####################################################################################
|
|
|
|
=============
|
|
4) The Code
|
|
=============
|
|
|
|
http://protekresearchlab.com/exploits/PRL-2012-23.djvu
|
|
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19385.djvu |