1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 |
Application: XnView FlashPix Image Processing Heap Overflow Platforms: Windows Secunia: SA47388 {PRL}: 2012-06 Author: Francis Provencher (Protek Research Lab's) Website: http://www.protekresearchlab.com/ Twitter: @ProtekResearch ##################################################################################### 1) Introduction 2) Report Timeline 3) Technical details 4) The Code ##################################################################################### =============== 1) Introduction =============== XnView is a cross-platform image viewer used for viewing, converting, organising and editing graphical & video files. It is free of charge for private, educational and non-profit organisations. For commercial use and distribution, the user must register the program. It is popular with users as it provides features normally found only in commercial image viewers. (http://en.wikipedia.org/wiki/XnView) ##################################################################################### ============================ 2) Report Timeline ============================ 2012-01-05Vulnerability reported to Secunia 2012-03-12Vendor disclose patch ##################################################################################### ============================ 3) Technical details ============================ The vulnerability is caused due to an error when processing FPX images, which can be exploited to cause an heap-based buffer overflow by tricking a user into opening a specially crafted image file. ##################################################################################### =========== 4) The Code =========== Here: http://www.protekresearchlab.com/exploits/PRL-2012-06.fpx Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18586.pfx (PRL-2012-06.fpx) |