IrfanView JLS Plugin JLS Compressed Image File Handling Overflow

High Nessus Plugin ID 60037


The remote host has an application installed that is affected by a heap-based buffer overflow vulnerability.


The version of the IrfanView JLS plugin (Jpeg_LS.dll) library is earlier than As such, it reportedly is affected by a heap- based buffer overflow caused by insufficient validation when processing compressed JLS images. An attacker could exploit this vulnerability to execute arbitrary code by tricking a user into opening a specially crafted JLS file.


Upgrade the JLS plugin to version or later.

See Also

Plugin Details

Severity: High

ID: 60037

File Name: irfanview_jpeg_ls_heap_overflow.nasl

Version: $Revision: 1.2 $

Type: local

Agent: windows

Family: Windows

Published: 2012/07/18

Modified: 2012/07/19

Dependencies: 57559

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 7.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:irfanview:irfanview

Required KB Items: SMB/IrfanView/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2012/06/20

Vulnerability Publication Date: 2012/07/05

Reference Information

CVE: CVE-2012-3585

BID: 54244

OSVDB: 83633

EDB-ID: 19483