ACDSee PRO 5.1 – ‘.PCT’ Image Processing Heap Overflow

  • 作者: Francis Provencher
    日期: 2012-06-22
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/19332/
  • #####################################################################################
    
    Application: ACDSee PRO PCT Image Processing Heap Overflow
    Platforms: Windows 
    
    Secunia: SA48804
    
    {PRL}: 2012-21
    
    Author: Francis Provencher (Protek Research Lab's) 
    
    Website: http://www.protekresearchlab.com/
    
    Twitter: @ProtekResearch
    
    
    #####################################################################################
    
    1) Introduction
    2) Report Timeline
    3) Technical details
    4) The Code
    
    
    #####################################################################################
    
    ===============
    1) Introduction
    ===============
    ACDSee is a shareware image organizer, viewer, and editor software for Microsoft
    Windows and Mac OS X 10.5 and higher developed by ACD Systems. It was originally
    distributed as a 16-bit application for Windows 3.0 and later supplanted by a 32-bit
    version for Windows 95.
    
    (http://en.wikipedia.org/wiki/ACDSee)
    
    #####################################################################################
    
    ============================
    2) Report Timeline
    ============================ 
    
    2012-03-13Vulnerability reported to Secunia
    2012-06-21Vendor disclose patch
    
    
    #####################################################################################
    
    ============================
    3) Technical details
    ============================
    Insufficient validation in ID_PICT.apl of specific byte values used as sizes in the image
    content can be exploited to cause a heap-based buffer overflow via a specially crafted .PCT file.
     
    
    The vulnerabilities are confirmed in version 5.1 (Build 137). Other versions may also be affected.
    
    #####################################################################################
    
    ===========
    4) The Code
    ===========
    
    http://protekresearchlab.com/exploits/PRL-2012-21.pct
    https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19332.pct