XnView 2.x < 2.04 Multiple Buffer Overflow Vulnerabilities

high Nessus Plugin ID 69137

Synopsis

The remote Windows host contains an application that is affected by multiple buffer overflow vulnerabilities.

Description

The version of XnView installed on the remote Windows host is 2.x, earlier than 2.04. It is, therefore, reportedly affected by the following overflow vulnerabilities:

- An unspecified error exists that could allow a buffer overflow during 'PCT' file handling. (CVE-2013-2577)

- Unspecified errors exist that could allow heap-based buffer overflows during 'FPX' and 'PSP' file handling.
(CVE-2013-3492, CVE-2013-3493)

Solution

Upgrade to XnView version 2.04 or later.

See Also

https://newsgroup.xnview.com/viewtopic.php?f=35&t=28400

https://seclists.org/bugtraq/2013/Jul/152

Plugin Details

Severity: High

ID: 69137

File Name: xnview_2_04.nasl

Version: 1.6

Type: local

Agent: windows

Family: Windows

Published: 7/30/2013

Updated: 11/15/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:xnview:xnview

Required KB Items: SMB/XnView/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 7/18/2013

Vulnerability Publication Date: 7/22/2013

Exploitable With

Core Impact

Reference Information

CVE: CVE-2013-2577, CVE-2013-3492, CVE-2013-3493

BID: 61397, 61503, 61505

Secunia: 54174