VRDA Feed by JPCERT/CC
  Vulnerability Response Decision Assistance Feed : 脆弱性脅威分析用情報の定型データ配信
[ about VRDA Feed | JPCERT/CC



 
分析対象脆弱性情報 (リビジョン番号 : 1) [ Download XML
CVE-2013-6932
irfanview: Buffer overflow in IrfanView before 4.37, when a mu...
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-6932

原文

Buffer overflow in IrfanView before 4.37, when a multibyte-character directory name is used, allows user-assisted remote attackers to execute arbitrary code via a crafted file that is incorrectly handled by the Thumbnail tooltips feature in the Thumbnails window.

翻訳   (表示)





この情報について
分析情報提供元:
NIST NVD
初版公開日:
2013-12-28
分析対象脆弱性情報の分類:
アドバイザリ・注意喚起
最終更新日:
2013-12-30




脆弱性の影響を受ける製品の識別子
cpe/search/results;jsessionid=47CB1C2D45279EEDFA46CD2ABFF89CEA?searchChoice=name&amp;searchText=cpe%3A%2Fa%3Airfanview%3Airfanview%3A4.00&amp;includeDeprecated=true&amp;page_num=0&amp;cid=1" title="cpe:/a:irfanview:irfanview:4.00" id="j_id242:0:0:0:0:j_id249" target="_blank">cpe:/a:irfanview:irfanview:4.00</a>
cpe/search/results;jsessionid=47CB1C2D45279EEDFA46CD2ABFF89CEA?searchChoice=name&amp;searchText=cpe%3A%2Fa%3Airfanview%3Airfanview%3A4.10&amp;includeDeprecated=true&amp;page_num=0&amp;cid=1" title="cpe:/a:irfanview:irfanview:4.10" id="j_id242:0:0:0:1:j_id249" target="_blank">cpe:/a:irfanview:irfanview:4.10</a>
cpe/search/results;jsessionid=47CB1C2D45279EEDFA46CD2ABFF89CEA?searchChoice=name&amp;searchText=cpe%3A%2Fa%3Airfanview%3Airfanview%3A4.20&amp;includeDeprecated=true&amp;page_num=0&amp;cid=1" title="cpe:/a:irfanview:irfanview:4.20" id="j_id242:0:0:0:2:j_id249" target="_blank">cpe:/a:irfanview:irfanview:4.20</a>
cpe/search/results;jsessionid=47CB1C2D45279EEDFA46CD2ABFF89CEA?searchChoice=name&amp;searchText=cpe%3A%2Fa%3Airfanview%3Airfanview%3A4.23&amp;includeDeprecated=true&amp;page_num=0&amp;cid=1" title="cpe:/a:irfanview:irfanview:4.23" id="j_id242:0:0:0:3:j_id249" target="_blank">cpe:/a:irfanview:irfanview:4.23</a>
cpe/search/results;jsessionid=47CB1C2D45279EEDFA46CD2ABFF89CEA?searchChoice=name&amp;searchText=cpe%3A%2Fa%3Airfanview%3Airfanview%3A4.25&amp;includeDeprecated=true&amp;page_num=0&amp;cid=1" title="cpe:/a:irfanview:irfanview:4.25" id="j_id242:0:0:0:4:j_id249" target="_blank">cpe:/a:irfanview:irfanview:4.25</a>
cpe/search/results;jsessionid=47CB1C2D45279EEDFA46CD2ABFF89CEA?searchChoice=name&amp;searchText=cpe%3A%2Fa%3Airfanview%3Airfanview%3A4.27&amp;includeDeprecated=true&amp;page_num=0&amp;cid=1" title="cpe:/a:irfanview:irfanview:4.27" id="j_id242:0:0:0:5:j_id249" target="_blank">cpe:/a:irfanview:irfanview:4.27</a>
cpe/search/results;jsessionid=47CB1C2D45279EEDFA46CD2ABFF89CEA?searchChoice=name&amp;searchText=cpe%3A%2Fa%3Airfanview%3Airfanview%3A4.28&amp;includeDeprecated=true&amp;page_num=0&amp;cid=1" title="cpe:/a:irfanview:irfanview:4.28" id="j_id242:0:0:0:6:j_id249" target="_blank">cpe:/a:irfanview:irfanview:4.28</a>
cpe/search/results;jsessionid=47CB1C2D45279EEDFA46CD2ABFF89CEA?searchChoice=name&amp;searchText=cpe%3A%2Fa%3Airfanview%3Airfanview%3A4.30&amp;includeDeprecated=true&amp;page_num=0&amp;cid=1" title="cpe:/a:irfanview:irfanview:4.30" id="j_id242:0:0:0:8:j_id249" target="_blank">cpe:/a:irfanview:irfanview:4.30</a>
cpe/search/results;jsessionid=47CB1C2D45279EEDFA46CD2ABFF89CEA?searchChoice=name&amp;searchText=cpe%3A%2Fa%3Airfanview%3Airfanview%3A4.32&amp;includeDeprecated=true&amp;page_num=0&amp;cid=1" title="cpe:/a:irfanview:irfanview:4.32" id="j_id242:0:0:0:7:j_id249" target="_blank">cpe:/a:irfanview:irfanview:4.32</a>
cpe/search/results;jsessionid=47CB1C2D45279EEDFA46CD2ABFF89CEA?searchChoice=name&amp;searchText=cpe%3A%2Fa%3Airfanview%3Airfanview%3A4.33&amp;includeDeprecated=true&amp;page_num=0&amp;cid=1" title="cpe:/a:irfanview:irfanview:4.33" id="j_id242:0:0:0:11:j_id249" target="_blank">cpe:/a:irfanview:irfanview:4.33</a>
cpe/search/results;jsessionid=47CB1C2D45279EEDFA46CD2ABFF89CEA?searchChoice=name&amp;searchText=cpe%3A%2Fa%3Airfanview%3Airfanview%3A4.35&amp;includeDeprecated=true&amp;page_num=0&amp;cid=1" title="cpe:/a:irfanview:irfanview:4.35" id="j_id242:0:0:0:10:j_id249" target="_blank">cpe:/a:irfanview:irfanview:4.35</a>
cpe/search/results;jsessionid=47CB1C2D45279EEDFA46CD2ABFF89CEA?searchChoice=name&amp;searchText=cpe%3A%2Fa%3Airfanview%3Airfanview%3A4.36&amp;includeDeprecated=true&amp;page_num=0&amp;cid=1" title="cpe:/a:irfanview:irfanview:4.36" id="j_id242:0:0:0:9:j_id249" target="_blank">cpe:/a:irfanview:irfanview:4.36</a> and previous versions
 


脆弱性の分析内容
[攻撃元区分]  [?]
未評価 [?]

ローカル [?]
隣接 [?]
X ネットワーク [?]

[攻撃条件の複雑さ]  [?]
未評価 [?]

X [?]
 [?]
 [?]

[攻撃前の認証要否]  [?]
未評価 [?]

複数 [?]
単一 [?]
X 不要 [?]

[機密性への影響]  [?]
未評価 [?]

影響なし [?]
部分的 [?]
X 全面的 [?]

[完全性への影響]  [?]
未評価 [?]

影響なし [?]
部分的 [?]
X 全面的 [?]

[可用性への影響]  [?]
未評価 [?]

影響なし [?]
部分的 [?]
X 全面的 [?]

関連情報




参考情報
CONFIRM http://www.irfanview.com/main_history.htm




JVN JVN#63194482




JVNDB JVNDB-2013-000120




Vulnerability Type Buffer Errors (CWE-119)





Copyright © 2013 JPCERT/CC All Rights Reserved.