<?xml version="1.0"?>
<?xml-stylesheet href="../fma_report_en.xslt" type="text/xsl" ?>

<advisory xml:space="preserve">
	<meta>
		<description>IrfanView 4.33 XCF (eXperimental Computing Facility) Multiple Vulnerabilities</description>
		<keywords>fuzzing, security, blackbox, tests, i_view32.exe, LCE, XCF, exploit</keywords>
	</meta>

	<title>IrfanView 4.33 XCF (eXperimental Computing Facility) Multiple Vulnerabilities</title>
	<id>FMA-2012-010</id>
	
	<application>
		<name>IrfanView</name>
		<version>4.3.3</version>
		<url>http://www.irfanview.com</url>
		<files>
			<file>
				<name>i_view32.exe</name>
				<version>4.3.3.0</version>
				<md5>072D046EDBA5528868DB40328A8E56F5</md5>
			</file>
		</files>		
		<verified>
			<os>
				<name>Windows XP SP3 Home Edition</name>
			</os>
			<os>
				<name>Windows XP SP3 Professional Edition</name>
			</os>
		</verified>
	</application>
	
	<discovery>
		<found>2012.04.05</found>
		<vendor_notified>2012.04.12</vendor_notified>
		<published>2013.03.24</published>
	</discovery>

	<vulnerabilities>
	
	<vulnerability>
			<name>Multiple Vulnerabilities in XCF file format processor.</name>
			<type>MULTIPLE</type>
			<description>During fuzzing of IrfanView 4.33 XCF file format our research lab has indentified multiple Vulnerabilities in XCF file format processor. A number of them allowed code execution in the tested application. XCF file format abbreviation stands for eXperimental Computing Facility image format which is the native image format of the GIMP program. One of the found and reported to vendor vulnerabilities is exploited in the following presentation. Issues were fixed in version 4.35 (http://www.irfanview.com/main_history.htm). The following code execution exploit targets stack overflow vulnerability present in XCF file format processor.</description>
			<exception>MULTIPLE</exception>
            <videos>
                <video>
                        <url>http://www.youtube.com/embed/9RA5TsHBmoo</url>
                        <width>420</width>
                        <height>315</height>
                </video>
            </videos>
		</vulnerability>	
	
	</vulnerabilities>
</advisory>