XnView FlashPix Image Processing – Heap Overflow

  • 作者: Francis Provencher
    日期: 2012-03-12
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/18586/
  • Application: XnView FlashPix Image Processing Heap Overflow
    
    Platforms: Windows 
    
    Secunia: SA47388
    
    {PRL}: 2012-06
    
    Author: Francis Provencher (Protek Research Lab's) 
    
    Website: http://www.protekresearchlab.com/
    
    Twitter: @ProtekResearch
    
    
    #####################################################################################
    
    1) Introduction
    2) Report Timeline
    3) Technical details
    4) The Code
    
    
    #####################################################################################
    
    ===============
    1) Introduction
    ===============
    XnView is a cross-platform image viewer used for viewing, converting, organising and editing graphical & video files.
    It is free of charge for private, educational and non-profit organisations. For commercial use and distribution,
    the user must register the program. It is popular with users as it provides features normally found only
    in commercial image viewers.
    
    (http://en.wikipedia.org/wiki/XnView)
    
    #####################################################################################
    
    ============================
    2) Report Timeline
    ============================
    
    2012-01-05Vulnerability reported to Secunia
    2012-03-12Vendor disclose patch
    
    
    #####################################################################################
    
    ============================
    3) Technical details
    ============================
    The vulnerability is caused due to an error when processing FPX images, which can be exploited to cause
    an heap-based buffer overflow by tricking a user into opening a specially crafted image file.
    
    #####################################################################################
    
    ===========
    4) The Code
    ===========
    
    Here: http://www.protekresearchlab.com/exploits/PRL-2012-06.fpx
    Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18586.pfx (PRL-2012-06.fpx)