module
Irfanview JPEG2000 jp2 Stack Buffer Overflow
Disclosed | Created |
---|---|
2012-01-16 | 2018-05-30 |
Disclosed
2012-01-16
Created
2018-05-30
Description
This module exploits a stack-based buffer overflow vulnerability in
version been tested on a specific version of irfanview (v4.3.2), although other
versions may work also. The vulnerability is triggered via parsing an
invalid qcd chunk structure and specifying a malformed qcd size and
data.
Payload delivery and vulnerability trigger can be executed in multiple
ways. The user can double click the file, use the file dialog, open via
the icon and drag/drop the file into Irfanview's window. An egg hunter
is used for stability.
version been tested on a specific version of irfanview (v4.3.2), although other
versions may work also. The vulnerability is triggered via parsing an
invalid qcd chunk structure and specifying a malformed qcd size and
data.
Payload delivery and vulnerability trigger can be executed in multiple
ways. The user can double click the file, use the file dialog, open via
the icon and drag/drop the file into Irfanview's window. An egg hunter
is used for stability.
Authors
Parvez Anwar parvez@greyhathacker.net
mr_me steventhomasseeley@gmail.com
juan vazquez juan.vazquez@metasploit.com
mr_me steventhomasseeley@gmail.com
juan vazquez juan.vazquez@metasploit.com
Platform
Windows
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.