- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 18739
- Проверка EDB
-
- Пройдено
- Автор
- FRANCIS PROVENCHER
- Тип уязвимости
- DOS
- Платформа
- WINDOWS
- CVE
- cve-2012-0278
- Дата публикации
- 2012-04-14
Код:
#####################################################################################
Application: IrfanView FlashPix PlugIn Decompression Heap Overflow
Platforms: Windows
Secunia Number: SA48772
{PRL}: 2012-08
Author: Francis Provencher (Protek Research Lab's)
Website: http://www.protekresearchlab.com/
Twitter: @ProtekResearch
#####################################################################################
1) Introduction
2) Timeline
3) Technical details
4) PoC
#####################################################################################
===============
1) Introduction
===============
IrfanView is a freeware/shareware image viewer for Microsoft Windows that can view, edit, and convert image files
and play video/audio files. It is noted for its small size, speed, ease of use, and ability to handle a wide variety of graphic
file formats, and has some image creation and painting capabilities. The software was first released in 1996.
IrfanView is free for non-commercial use; commercial use requires paid registration.
#####################################################################################
============
2) Timeline
============
2012-04-06 - Vulnerability reported to secunia
2012-04-13 - Coordinated public release of advisory
#####################################################################################
=================
3) Technical details
=================
The vulnerability is caused due to insufficient validation when decompressing FlashPix images
and can be exploited to cause a heap-based buffer overflow via a specially crafted FPX file.
#####################################################################################
=============
4) The PoC
=============
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19960.fpx
###############################################################################
- Источник
- www.exploit-db.com