XnView < 1.99.1 JPEG Compressed TIFF Image Multiple Header Value Handling Overflow

High Nessus Plugin ID 62121


The remote Windows host contains an application with a buffer overflow vulnerability.


The version of XnView installed on the remote Windows host is earlier than 1.99.1. It is, therefore, reportedly affected by a heap-based buffer overflow vulnerability. This is due to an error in the handling of TIFF image files having JPEG compression. Specially crafted files of this type can contain certain 'ImageLength' and 'ImageWidth' header values which trigger the vulnerability. Arbitrary code execution is possible.


Upgrade to XnView version 1.99.1 or later as that reportedly resolves the issue.

See Also



Plugin Details

Severity: High

ID: 62121

File Name: xnview_1_99_1.nasl

Version: $Revision: 1.2 $

Type: local

Agent: windows

Family: Windows

Published: 2012/09/17

Modified: 2012/09/18

Dependencies: 30130

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:xnview:xnview

Required KB Items: SMB/XnView/Version

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2012/09/06

Vulnerability Publication Date: 2012/09/09

Reference Information

BID: 55482

OSVDB: 85359