First published: Thu Oct 25 2012(Updated: )
Heap-based buffer overflow in IrfanView before 4.32 allows remote attackers to execute arbitrary code via crafted "Rows Per Strip" and "Samples Per Pixel" values in a TIFF image file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
IrfanView | <=4.30 | |
IrfanView | =3.90 | |
IrfanView | =3.91 | |
IrfanView | =3.92 | |
IrfanView | =3.95 | |
IrfanView | =3.97 | |
IrfanView | =3.98 | |
IrfanView | =3.99 | |
IrfanView | =4.00 | |
IrfanView | =4.10 | |
IrfanView | =4.20 | |
IrfanView | =4.23 | |
IrfanView | =4.25 | |
IrfanView | =4.27 | |
IrfanView | =4.28 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-5233 is classified as a high severity vulnerability due to its ability to allow remote code execution.
To fix CVE-2011-5233, users should update IrfanView to version 4.32 or later.
CVE-2011-5233 is a heap-based buffer overflow vulnerability.
All versions of IrfanView prior to 4.32, including versions 3.90 to 4.28, are affected by CVE-2011-5233.
Yes, CVE-2011-5233 can be exploited using specially crafted TIFF image files.