Exploit IrfanView - '.tiff' Image Processing Buffer Overflow

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
18257
Проверка EDB
  1. Пройдено
Автор
FRANCIS PROVENCHER
Тип уязвимости
DOS
Платформа
WINDOWS
CVE
cve-2011-5233
Дата публикации
2011-12-20
Код:
#####################################################################################

Application:   IrfanView TIFF Image Processing Buffer Overflow Vulnerability

Platforms:   Windows

Exploitation:   Remote code execution

Secunia Number:   SA47065  

{PRL}:   2011-10

Author:   Francis Provencher (Protek Research Lab's)

Website:   http://www.protekresearchlab.com/

Twitter:   @ProtekResearch

#####################################################################################

1) Introduction
2) Timeline
3) Technical details
4) PoC


#####################################################################################

===============
1) Introduction
===============

IrfanView is a freeware/shareware image viewer for Microsoft Windows that can view, edit, and convert image files

and play video/audio files. It is noted for its small size, speed, ease of use, and ability to handle a wide variety of graphic

file formats, and has some image creation and painting capabilities. The software was first released in 1996.

IrfanView is free for non-commercial use; commercial use requires paid registration.

#####################################################################################

============
2) Timeline
============


2011-12-02 - Vulnerability reported to vendor
2011-12-20 - Coordinated public release of advisory

#####################################################################################

=================
3) Technical details
=================
The vulnerability is caused due to an error when processing TIFF images with certain "Rows Per Strip" and "Samples Per Pixel"

values, which can be exploited to cause a heap-based buffer overflow by tricking a user into opening a specially crafted TIFF

image file.


#####################################################################################

=============
4) The Code
=============

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18257.tif
http://www.protekresearchlab.com/exploits/PRL-2011-10.tif
 
Источник
www.exploit-db.com

Похожие темы