Short Name |
HTTP:MISC:IRFVIEW-JP2-BO |
---|---|
Severity |
Major |
Recommended |
Yes |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
Irfanview JPEG2000 JP2 Stack Buffer Overflow |
Release Date |
2015/06/09 |
Update Number |
2503 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known vulnerability in Irfanview while parsing a specially crafted JP2 file. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the application.
IrfanView JPEG-2000 Plugin is prone to a remote stack-based buffer-overflow vulnerability because the software fails to properly bounds-check user-supplied input before copying it to an insufficiently sized memory buffer. Successful exploits allow remote attackers to execute arbitrary code in the context of the vulnerable application. Failed exploit attempts likely result in denial-of-service conditions. IrfanView JPEG-2000 Plugin 4.32 is vulnerable; other versions may also be affected.