header-logo
Suggest Exploit
vendor:
IrfanView
by:
Francis Provencher
7.5
CVSS
HIGH
Remote code execution
415
CWE
Product Name: IrfanView
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: Yes
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2011

IrfanView FlashPix PlugIn Double-Free Vulnerability

The vulnerability is caused due to the 'Free_All_Memory()' function not properly setting certain decoder elements to NULL after freeing them, which can be exploited to cause a double-free condition via specially crafted FPX images.

Mitigation:

Update to the latest version of IrfanView
Source

Exploit-DB raw data:

#####################################################################################

Application:  IrfanView FlashPix PlugIn Double-Free Vulnerability

Platforms:   Windows

Exploitation:   Remote code execution

Secunia Number:   SA47322  

{PRL}:   2011-11

Author:   Francis Provencher (Protek Research Lab's)

Website:   http://www.protekresearchlab.com/

Twitter:   @ProtekResearch

#####################################################################################

1) Introduction
2) Timeline
3) Technical details
4) PoC


#####################################################################################

===============
1) Introduction
===============

IrfanView is a freeware/shareware image viewer for Microsoft Windows that can view, edit, and convert image files

and play video/audio files. It is noted for its small size, speed, ease of use, and ability to handle a wide variety of graphic

file formats, and has some image creation and painting capabilities. The software was first released in 1996.

IrfanView is free for non-commercial use; commercial use requires paid registration.

#####################################################################################

============
2) Timeline
============


2011-12-08 - Vulnerability reported to vendor
2011-12-20 - Coordinated public release of advisory

#####################################################################################

=================
3) Technical details
=================

The vulnerability is caused due to the "Free_All_Memory()" function not properly setting certain decoder elements to

NULL after freeing them, which can be exploited to cause a double-free condition via specially crafted FPX images.

#####################################################################################

=============
4) The Code
=============
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18256.fpx
http://www.protekresearchlab.com/exploits/PRL-2011-11.fpx