CVE-2024-11519

7.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious RLE files in IrfanView. Attackers can gain full control of the affected system through memory corruption. All IrfanView users who open untrusted RLE files are affected.

💻 Affected Systems

Products:
  • IrfanView
Versions: Versions before 4.67
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All Windows versions running vulnerable IrfanView versions are affected. The vulnerability is in the RLE file parser component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining the same privileges as the user running IrfanView, potentially leading to data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Malware installation or system compromise when users open malicious RLE files from phishing emails or compromised websites.

🟢

If Mitigated

Limited to application crash or denial of service if exploit fails or security controls block execution.

🌐 Internet-Facing: MEDIUM - Requires user interaction to open malicious files, but RLE files could be delivered via web downloads or email attachments.
🏢 Internal Only: LOW - Primarily requires user interaction with malicious files, which is less likely in controlled internal environments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction but is technically straightforward once a malicious file is opened. ZDI has confirmed the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: IrfanView 4.67 and later

Vendor Advisory: https://www.irfanview.com/main_history.htm

Restart Required: No

Instructions:

1. Download latest IrfanView from official website. 2. Run installer. 3. Follow installation prompts. 4. Verify version is 4.67 or higher.

🔧 Temporary Workarounds

Disable RLE file association

windows

Remove IrfanView as default handler for .rle files to prevent automatic opening

Control Panel > Default Programs > Set Associations > Find .rle > Change to another program or none

Block RLE files at perimeter

all

Configure email/web filters to block .rle file attachments

🧯 If You Can't Patch

  • Implement application whitelisting to prevent IrfanView execution
  • Use Windows Defender Application Control or AppLocker to restrict IrfanView

🔍 How to Verify

Check if Vulnerable:

Open IrfanView > Help > About > Check version number is below 4.67

Check Version:

irfanview.exe /?

Verify Fix Applied:

Open IrfanView > Help > About > Confirm version is 4.67 or higher

📡 Detection & Monitoring

Log Indicators:

  • IrfanView crash logs
  • Windows Application Error events with IrfanView process

Network Indicators:

  • Downloads of .rle files to user workstations
  • Unusual outbound connections after IrfanView execution

SIEM Query:

EventID=1000 AND ProcessName="i_view32.exe" OR ProcessName="i_view64.exe"

🔗 References

📤 Share & Export