PRL-2012-23

#####################################################################################

Application:   IrfanView DJVU Image Processing Heap Overflow

Version:   The vulnerability is confirmed in version 4.33. Other versions may also be affected

Plateform:   Windows

Exploitation:   Remote code execution

Secunia Number:   SA49176

{PRL}:   2012-23

Author:   Francis Provencher (Protek Research Lab’s)

Website:   http://www.protekresearchlab.com/

Twitter:   @ProtekResearch

#####################################################################################

1) Introduction
2) Timeline
3) Technical details
4) PoC

#####################################################################################

===============
1) Introduction
===============

IrfanView is a freeware/shareware image viewer for Microsoft Windows that can view, edit, and convert image files

and play video/audio files. It is noted for its small size, speed, ease of use, and ability to handle a wide variety of graphic

file formats, and has some image creation and painting capabilities. The software was first released in 1996.

IrfanView is free for non-commercial use; commercial use requires paid registration.

#####################################################################################

============
2) Timeline
============
2012-05-15 – Vulnerability reported to secunia
2012-06-22 – Coordinated public release of advisory

#####################################################################################

=================
3) Technical details
=================

The vulnerability is caused due to an error when decompressing DjVu images

and can be exploited to cause a heap-based buffer overflow via a specially crafted file.

#####################################################################################

=============
4) The Code
=============

Here

###############################################################################