IrfanView Formats Plugin TTF File Buffer Overflow Vulnerability

high Nessus Plugin ID 59847

Synopsis

The remote host has an application installed that is affected by a buffer overflow vulnerability.

Description

The version of the IrfanView Formats plugin (Formats.dll) was found to be less than 4.34. Such versions are affected by a stack-based buffer overflow caused by insufficient bounds checking when parsing TTF font names. An attacker could exploit this vulnerability to execute arbitrary code by tricking a user into opening a specially crafted .ttf file.

Solution

Upgrade the Formats plugin to version 4.3.4.0 (4.34) or higher.

See Also

https://www.irfanview.com/plugins.htm

http://www.nessus.org/u?3fcba641

Plugin Details

Severity: High

ID: 59847

File Name: irfanview_formats_stack_overflow.nasl

Version: 1.5

Type: local

Agent: windows

Family: Windows

Published: 7/5/2012

Updated: 11/15/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:irfanview:irfanview

Required KB Items: SMB/IrfanView/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/31/2012

Vulnerability Publication Date: 6/1/2012

Reference Information

BID: 53756