CVE-2011-5233

Heap-based buffer overflow in IrfanView before 4.32 allows remote attackers to execute arbitrary code via crafted "Rows Per Strip" and "Samples Per Pixel" values in a TIFF image file.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:irfanview:irfanview:*:*:*:*:*:*:*:*
cpe:2.3:a:irfanview:irfanview:3.90:*:*:*:*:*:*:*
cpe:2.3:a:irfanview:irfanview:3.91:*:*:*:*:*:*:*
cpe:2.3:a:irfanview:irfanview:3.92:*:*:*:*:*:*:*
cpe:2.3:a:irfanview:irfanview:3.95:*:*:*:*:*:*:*
cpe:2.3:a:irfanview:irfanview:3.97:*:*:*:*:*:*:*
cpe:2.3:a:irfanview:irfanview:3.98:*:*:*:*:*:*:*
cpe:2.3:a:irfanview:irfanview:3.99:*:*:*:*:*:*:*
cpe:2.3:a:irfanview:irfanview:4.00:*:*:*:*:*:*:*
cpe:2.3:a:irfanview:irfanview:4.10:*:*:*:*:*:*:*
cpe:2.3:a:irfanview:irfanview:4.20:*:*:*:*:*:*:*
cpe:2.3:a:irfanview:irfanview:4.23:*:*:*:*:*:*:*
cpe:2.3:a:irfanview:irfanview:4.25:*:*:*:*:*:*:*
cpe:2.3:a:irfanview:irfanview:4.27:*:*:*:*:*:*:*
cpe:2.3:a:irfanview:irfanview:4.28:*:*:*:*:*:*:*

History

21 Nov 2024, 01:33

Type Values Removed Values Added
References () http://secunia.com/advisories/47065 - Vendor Advisory () http://secunia.com/advisories/47065 - Vendor Advisory
References () http://www.exploit-db.com/exploits/18257 - Exploit () http://www.exploit-db.com/exploits/18257 - Exploit
References () http://www.irfanview.com/history_old.htm - () http://www.irfanview.com/history_old.htm -
References () http://www.osvdb.org/77957 - () http://www.osvdb.org/77957 -
References () http://www.protekresearchlab.com/index.php?option=com_content&view=article&id=30&Itemid=30 - () http://www.protekresearchlab.com/index.php?option=com_content&view=article&id=30&Itemid=30 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/71891 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/71891 -

Information

Published : 2012-10-25 17:55

Updated : 2024-11-21 01:33


NVD link : CVE-2011-5233

Mitre link : CVE-2011-5233

CVE.ORG link : CVE-2011-5233


JSON object : View

Products Affected

irfanview

  • irfanview
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer