÷ÏÔ ÔÁËÏÊ ×ÅËÔÏÒ ÁÔÁËÉ ÏËÁÚÁÌÓÑ..
> ----------------------------------------------------------------------
>
> TITLE:
> IrfanView Animated Cursor Handling Buffer Overflow
>
> SECUNIA ADVISORY ID:
> SA24725
>
> VERIFY ADVISORY:
> http://secunia.com/advisories/24725/
>
> CRITICAL:
> Highly critical
>
> IMPACT:
> System access
>
> WHERE:
> From remote
>
> SOFTWARE:
> IrfanView 3.x
> http://secunia.com/product/2532/
>
> DESCRIPTION:
> Marsu Pilami has discovered a vulnerability in IrfanView, which can
> be exploited by malicious people to compromise a user's system.
>
> The vulnerability is caused due to a boundary error within the
> handling of animated cursor (.ANI) files and can be exploited to
> cause a stack-based buffer overflow via a specially crafted animated
> cursor file.
>
> Successful exploitation allows execution of arbitrary code when a
> user e.g. opens a malicious .ANI image.
>
> The vulnerability is confirmed in version 3.99. Other versions may
> also be affected.
>
> SOLUTION:
> Do not open images from untrusted sources.
>
> PROVIDED AND/OR DISCOVERED BY:
> Marsu Pilami
>
> ORIGINAL ADVISORY:
> http://milw0rm.com/exploits/3648
>