Description
Multiple heap-based buffer overflows in XnView before 1.99 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a (1) SGI32LogLum compressed TIFF image or (2) SGI32LogLum compressed TIFF image with the PhotometricInterpretation encoding set to LogL.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by Francis Provencher · textdoswindows
https://www.exploit-db.com/exploits/19338
exploitdb
WRITEUP
VERIFIED
by Francis Provencher · textdoswindows
https://www.exploit-db.com/exploits/19337
References (6)
Core 6
Core References
Various Sources x_refsource_misc
http://www.protekresearchlab.com/index.php?option=com_content&view=article&id=49
Various Sources x_refsource_misc
http://www.protekresearchlab.com/index.php?option=com_content&view=article&id=48
Various Sources x_refsource_confirm
http://newsgroup.xnview.com/viewtopic.php?f=35&t=25858
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/48666
Exploit exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/19338
Exploit exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/19337
Scores
EPSS
0.1661
EPSS Percentile
94.9%
Details
CWE
CWE-119
Status
published
Products (1)
xnview/xnview
< 1.98.8
Published
Jul 17, 2012
Tracked Since
Feb 18, 2026