XnView 2.x < 2.03 Multiple Buffer Overflow Vulnerabilities

High Nessus Plugin ID 66859


The remote Windows host contains an application that is affected by multiple buffer overflow vulnerabilities.


The version of XnView installed on the remote Windows host is 2.x, earlier than 2.03. It is, therefore, reportedly affected by the following buffer overflow vulnerabilities:

- A stack-based buffer overflow exists in the 'XCF' image handling layer. (CVE-2013-3246)

- A heap-based buffer overflow exists when handling decompression of RLE layers in a specially crafted 'XCF' file. (CVE-2013-3247)


Upgrade to XnView version 2.03 or later.

See Also


Plugin Details

Severity: High

ID: 66859

File Name: xnview_2_03.nasl

Version: $Revision: 1.2 $

Type: local

Agent: windows

Family: Windows

Published: 2013/06/11

Modified: 2013/06/19

Dependencies: 30130

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 7.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:xnview:xnview

Required KB Items: SMB/XnView/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2013/05/29

Vulnerability Publication Date: 2013/05/29

Exploitable With

Core Impact

Reference Information

CVE: CVE-2013-3246, CVE-2013-3247

BID: 60233, 60235

OSVDB: 93746, 93747