XnView 2.x < 2.03 Multiple Buffer Overflow Vulnerabilities

This script is Copyright (C) 2013 Tenable Network Security, Inc.


Synopsis :

The remote Windows host contains an application that is affected by
multiple buffer overflow vulnerabilities.

Description :

The version of XnView installed on the remote Windows host is 2.x,
earlier than 2.03. It is, therefore, reportedly affected by the
following buffer overflow vulnerabilities:

- A stack-based buffer overflow exists in the 'XCF' image
handling layer. (CVE-2013-3246)

- A heap-based buffer overflow exists when handling
decompression of RLE layers in a specially crafted 'XCF'
file. (CVE-2013-3247)

See also :

http://newsgroup.xnview.com/viewtopic.php?f=35&t=28072

Solution :

Upgrade to XnView version 2.03 or later.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.3
(CVSS2#E:POC/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 66859 ()

Bugtraq ID: 60233
60235

CVE ID: CVE-2013-3246
CVE-2013-3247

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now