[] NeoSense

IrfanView FlashPix PlugIn - Decompression Heap Overflow

Author: Francis Provencher
type: dos
platform: windows
port: 
date_added: 2012-04-14 
date_updated: 2016-10-31 
verified: 1 
codes: OSVDB-81151;CVE-2012-0278 
tags: 
aliases:  
screenshot_url: http://www.exploit-db.com/screenshots/idlt19000/screen-shot-2012-04-14-at-115154-am.png 
application_url: http://www.exploit-db.comiview433_setup.exe

#####################################################################################

Application:  IrfanView FlashPix PlugIn Decompression Heap Overflow

Platforms:   Windows

Secunia Number:   SA48772

{PRL}:   2012-08

Author:   Francis Provencher (Protek Research Lab's)

Website:   http://www.protekresearchlab.com/

Twitter:   @ProtekResearch

#####################################################################################

1) Introduction
2) Timeline
3) Technical details
4) PoC


#####################################################################################

===============
1) Introduction
===============

IrfanView is a freeware/shareware image viewer for Microsoft Windows that can view, edit, and convert image files

and play video/audio files. It is noted for its small size, speed, ease of use, and ability to handle a wide variety of graphic

file formats, and has some image creation and painting capabilities. The software was first released in 1996.

IrfanView is free for non-commercial use; commercial use requires paid registration.

#####################################################################################

============
2) Timeline
============


2012-04-06 - Vulnerability reported to secunia
2012-04-13 - Coordinated public release of advisory

#####################################################################################

=================
3) Technical details
=================

The vulnerability is caused due to insufficient validation when decompressing FlashPix images

and can be exploited to cause a heap-based buffer overflow via a specially crafted FPX file.

#####################################################################################

=============
4) The PoC
=============

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19960.fpx


###############################################################################