First published: Sat Dec 28 2013(Updated: )
Buffer overflow in IrfanView before 4.37, when a multibyte-character directory name is used, allows user-assisted remote attackers to execute arbitrary code via a crafted file that is incorrectly handled by the Thumbnail tooltips feature in the Thumbnails window.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
IrfanView IrfanView | <=4.36 | |
IrfanView IrfanView | =4.00 | |
IrfanView IrfanView | =4.10 | |
IrfanView IrfanView | =4.20 | |
IrfanView IrfanView | =4.23 | |
IrfanView IrfanView | =4.25 | |
IrfanView IrfanView | =4.27 | |
IrfanView IrfanView | =4.28 | |
IrfanView IrfanView | =4.30 | |
IrfanView IrfanView | =4.32 | |
IrfanView IrfanView | =4.33 | |
IrfanView IrfanView | =4.35 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-6932 is classified as a high severity vulnerability due to its potential to allow remote code execution.
To fix CVE-2013-6932, upgrade IrfanView to version 4.37 or later.
CVE-2013-6932 affects IrfanView versions up to 4.36, including 4.00, 4.10, 4.20, 4.23, 4.25, 4.27, 4.28, 4.30, 4.32, 4.33, and 4.35.
CVE-2013-6932 is triggered by a buffer overflow in the Thumbnail tooltips feature when handling multibyte-character directory names.
Exploitation of CVE-2013-6932 requires user interaction, as it necessitates opening a specially crafted file.