XnView 2.x < 2.03 Multiple Buffer Overflow Vulnerabilities

high Nessus Plugin ID 66859

Synopsis

The remote Windows host contains an application that is affected by multiple buffer overflow vulnerabilities.

Description

The version of XnView installed on the remote Windows host is 2.x, earlier than 2.03. It is, therefore, reportedly affected by the following buffer overflow vulnerabilities:

- A stack-based buffer overflow exists in the 'XCF' image handling layer. (CVE-2013-3246)

- A heap-based buffer overflow exists when handling decompression of RLE layers in a specially crafted 'XCF' file. (CVE-2013-3247)

Solution

Upgrade to XnView version 2.03 or later.

See Also

https://newsgroup.xnview.com/viewtopic.php?f=35&t=28072

Plugin Details

Severity: High

ID: 66859

File Name: xnview_2_03.nasl

Version: 1.4

Type: local

Agent: windows

Family: Windows

Published: 6/11/2013

Updated: 11/15/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:xnview:xnview

Required KB Items: SMB/XnView/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/29/2013

Vulnerability Publication Date: 5/29/2013

Exploitable With

Core Impact

Reference Information

CVE: CVE-2013-3246, CVE-2013-3247

BID: 60233, 60235