CVE-2024-11521

7.8 HIGH

📋 TL;DR

This is a use-after-free vulnerability in IrfanView's DJVU file parser that allows remote code execution. Attackers can exploit it by tricking users into opening malicious DJVU files, potentially gaining full control of the affected system. All IrfanView users who process DJVU files are affected.

💻 Affected Systems

Products:
  • IrfanView
Versions: Versions prior to 4.67
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires DJVU plugin/format support enabled (default in most installations).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining the same privileges as the logged-in user, potentially leading to data theft, ransomware deployment, or lateral movement.

🟠

Likely Case

Malware installation, data exfiltration, or system disruption when users open malicious DJVU files from untrusted sources.

🟢

If Mitigated

Limited impact if proper application sandboxing, least privilege, and file validation are in place.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

User interaction required (opening malicious file). Exploit development is straightforward given the use-after-free nature.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: IrfanView 4.67

Vendor Advisory: https://www.irfanview.com/main_history.htm

Restart Required: No

Instructions:

1. Download IrfanView 4.67 or later from official website
2. Run installer and follow prompts
3. Verify installation by checking Help > About

🔧 Temporary Workarounds

Disable DJVU file association

windows

Prevent IrfanView from automatically opening DJVU files

Control Panel > Default Programs > Associate a file type or protocol with a program > Change .djvu to open with different application

Block DJVU files at perimeter

all

Prevent malicious DJVU files from reaching users

🧯 If You Can't Patch

  • Run IrfanView with restricted user privileges (not as administrator)
  • Implement application allowlisting to prevent unauthorized execution

🔍 How to Verify

Check if Vulnerable:

Open IrfanView, go to Help > About, check if version is earlier than 4.67

Check Version:

irfanview.exe /?

Verify Fix Applied:

Confirm IrfanView version is 4.67 or later in Help > About

📡 Detection & Monitoring

Log Indicators:

  • IrfanView crash logs with memory access violations
  • Unexpected process creation from IrfanView

Network Indicators:

  • Outbound connections from IrfanView process to unknown IPs
  • DNS requests for suspicious domains after file open

SIEM Query:

Process Creation where Image contains 'i_view' AND ParentImage contains 'explorer'

🔗 References

📤 Share & Export