English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 114770 CVE descriptions
and 58768 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.811953
Category:Denial of Service
Title:IrfanView Multiple DoS Vulnerabilities
Summary:This host is installed with IrfanView and is; prone to multiple denial of service vulnerabilities.
Description:Summary:
This host is installed with IrfanView and is
prone to multiple denial of service vulnerabilities.

Vulnerability Insight:
Multiple flaws exits due to

- Read Access Violation.

- Data from Faulting Address controls Branch Selection.

- User Mode Write AV near NULL.

- For more information refer to reference links

Vulnerability Impact:
Successful exploitation will allow remote
attackers to to execute arbitrary code or cause a denial of service.

Impact Level: Application

Affected Software/OS:
IrfanView Version 4.50 64-bit

Solution:
No solution or patch is available as of
26th Oct, 2017. Information regarding this issue will be updated once the
solution details are available.
For updates refer to http://www.irfanview.com/

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2017-15769
Common Vulnerability Exposure (CVE) ID: CVE-2017-15768
Common Vulnerability Exposure (CVE) ID: CVE-2017-15766
Common Vulnerability Exposure (CVE) ID: CVE-2017-15767
Common Vulnerability Exposure (CVE) ID: CVE-2017-15765
Common Vulnerability Exposure (CVE) ID: CVE-2017-15764
Common Vulnerability Exposure (CVE) ID: CVE-2017-15763
Common Vulnerability Exposure (CVE) ID: CVE-2017-15762
Common Vulnerability Exposure (CVE) ID: CVE-2017-15761
Common Vulnerability Exposure (CVE) ID: CVE-2017-15759
Common Vulnerability Exposure (CVE) ID: CVE-2017-15760
Common Vulnerability Exposure (CVE) ID: CVE-2017-15758
Common Vulnerability Exposure (CVE) ID: CVE-2017-15757
Common Vulnerability Exposure (CVE) ID: CVE-2017-15756
Common Vulnerability Exposure (CVE) ID: CVE-2017-15755
Common Vulnerability Exposure (CVE) ID: CVE-2017-15754
Common Vulnerability Exposure (CVE) ID: CVE-2017-15752
Common Vulnerability Exposure (CVE) ID: CVE-2017-15753
Common Vulnerability Exposure (CVE) ID: CVE-2017-15751
Common Vulnerability Exposure (CVE) ID: CVE-2017-15750
Common Vulnerability Exposure (CVE) ID: CVE-2017-15749
Common Vulnerability Exposure (CVE) ID: CVE-2017-15748
Common Vulnerability Exposure (CVE) ID: CVE-2017-15747
Common Vulnerability Exposure (CVE) ID: CVE-2017-15745
Common Vulnerability Exposure (CVE) ID: CVE-2017-15746
Common Vulnerability Exposure (CVE) ID: CVE-2017-15744
Common Vulnerability Exposure (CVE) ID: CVE-2017-15743
Common Vulnerability Exposure (CVE) ID: CVE-2017-15742
Common Vulnerability Exposure (CVE) ID: CVE-2017-15741
Common Vulnerability Exposure (CVE) ID: CVE-2017-15740
Common Vulnerability Exposure (CVE) ID: CVE-2017-15738
Common Vulnerability Exposure (CVE) ID: CVE-2017-15739
Common Vulnerability Exposure (CVE) ID: CVE-2017-15737
CopyrightCopyright (C) 2017 Greenbone Networks GmbH

This is only one of 58768 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Developer APIs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2017 E-Soft Inc. All rights reserved.