Summary
This host has XnView installed and is prone to multiple heap based buffer overflow vulnerabilities.
Vulnerabilities Insight:
- Insufficient validation when decompressing SGI32LogLum compressed TIFF images.
- Insufficient validation when decompressing SGI32LogLum compressed TIFF images where the PhotometricInterpretation encoding is set to LogL.
- Insufficient validation when decompressing PCT images.
- An indexing error when processing the ImageDescriptor structure of GIF images.
Impact
Successful exploitation will allow attackers to execute arbitrary code on the system or cause a denial of service condition.
Impact Level: System/Application
Solution
Update to XnView version 1.99 or later,
For updates refer to http://www.xnview.com/
Affected
XnView versions prior to 1.99 on windows
References
- http://newsgroup.xnview.com/viewtopic.php?f=35&t=25858
- http://secunia.com/advisories/48666
- http://www.exploit-db.com/exploits/19336/
- http://www.exploit-db.com/exploits/19337/
- http://www.exploit-db.com/exploits/19338/
- http://www.protekresearchlab.com/index.php?option=com_content&view=article&id=48
- http://www.protekresearchlab.com/index.php?option=com_content&view=article&id=49
- http://www.protekresearchlab.com/index.php?option=com_content&view=article&id=50
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2012-0276, CVE-2012-0277, CVE-2012-0282 -
CVSS Base Score: 6.8
AV:N/AC:M/Au:N/C:P/I:P/A:P
Related Vulnerabilities