[Exploit]  [Remote]  [Local]  [Web Apps]  [Dos/Poc]  [Shellcode]  [RSS]

# Title : IrfanView TIF Image Decompression Buffer Overflow Vulnerability
# Published : 2012-11-13
# Author :
# Previous Title : Sony PC Companion 2.1 (Admin_RemoveDirectory()) Stack-based Unicode Buffer Overflow
# Next Title : FireFly Mediaserver 1.0.0.1359 NULL Pointer Dereference


#####################################################################################

Application:  IrfanView TIF Image Decompression Buffer Overflow Vulnerability
Plateform:   Windows
Version:   The vulnerabilities are confirmed in version 4.33. Other versions may also be affected.
Exploitation:   Remote code execution

Secunia Number:   SA49856

{PRL}:   2012-31

Author:   Francis Provencher (Protek Research Lab's)

Website:   http://www.protekresearchlab.com/

Twitter:   @ProtekResearch

#####################################################################################

1) Introduction
2) Timeline
3) Technical details
4) PoC


#####################################################################################

===============
1) Introduction
===============
IrfanView is a freeware/shareware image viewer for Microsoft Windows that can view, edit, and convert image files
and play video/audio files. It is noted for its small size, speed, ease of use, and ability to handle a wide variety of graphic
file formats, and has some image creation and painting capabilities. The software was first released in 1996.
IrfanView is free for non-commercial use; commercial use requires paid registration.
#####################################################################################

============
2) Timeline
============

2012-07-11 - Vulnerability reported to secunia
2012-11-12 - Coordinated public release of advisory

#####################################################################################

=================
3) Technical details
=================
An error when processing JPEG compressed TIFF images can be exploited to cause a
heap-based buffer overflow via a specially crafted "ImageWidth" value.
#####################################################################################

=============
4) The Code
=============

http://protekresearchlab.com/exploits/PRL-2012-31.tif
http://www.exploit-db.com/sploits/PRL-2012-31.tif.tar.gz