##################################################################################### Application: IrfanView DJVU Image Processing Heap Overflow Version: The vulnerability is confirmed in version 4.33. Other versions may also be affected Plateform: Windows Exploitation: Remote code execution Secunia Number: SA49176 {PRL}: 2012-23 Author: Francis Provencher (Protek Research Lab's) Website: http://www.protekresearchlab.com/ Twitter: @ProtekResearch ##################################################################################### 1) Introduction 2) Timeline 3) Technical details 4) PoC ##################################################################################### =============== 1) Introduction =============== IrfanView is a freeware/shareware image viewer for Microsoft Windows that can view, edit, and convert image files and play video/audio files. It is noted for its small size, speed, ease of use, and ability to handle a wide variety of graphic file formats, and has some image creation and painting capabilities. The software was first released in 1996. IrfanView is free for non-commercial use; commercial use requires paid registration. ##################################################################################### ============ 2) Timeline ============ 2012-05-15 - Vulnerability reported to secunia 2012-06-22 - Coordinated public release of advisory ##################################################################################### ================= 3) Technical details ================= The vulnerability is caused due to an error when decompressing DjVu images and can be exploited to cause a heap-based buffer overflow via a specially crafted file. ##################################################################################### ============= 4) The Code ============= http://protekresearchlab.com/exploits/PRL-2012-23.djvu https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19385.djvu