CVE-2024-11527

7.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious DWG files in IrfanView. The flaw exists in DWG file parsing due to improper input validation, leading to memory corruption. All IrfanView users who open untrusted DWG files are affected.

💻 Affected Systems

Products:
  • IrfanView
Versions: Versions prior to 4.67
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: IrfanView must have DWG file format support enabled (typically via plugins).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining the same privileges as the user running IrfanView, potentially leading to data theft, ransomware deployment, or lateral movement.

🟠

Likely Case

Malware installation or system compromise when users open malicious DWG files from untrusted sources like email attachments or downloads.

🟢

If Mitigated

Limited impact with proper application sandboxing, restricted user privileges, and file type blocking preventing successful exploitation.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

User interaction required (opening malicious file). The vulnerability is well-documented and memory corruption flaws are commonly weaponized.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: IrfanView 4.67

Vendor Advisory: https://www.irfanview.com/main_history.htm

Restart Required: No

Instructions:

1. Download IrfanView 4.67 or later from official website
2. Run installer and follow prompts
3. Verify installation by checking Help > About

🔧 Temporary Workarounds

Disable DWG file association

windows

Remove DWG file type association with IrfanView to prevent automatic opening

Control Panel > Default Programs > Associate a file type or protocol with a program > Select .dwg > Change program > Choose different application

Block DWG files at perimeter

all

Configure email/web filters to block .dwg attachments and downloads

🧯 If You Can't Patch

  • Implement application allowlisting to prevent unauthorized IrfanView execution
  • Run IrfanView with restricted user privileges (non-admin)

🔍 How to Verify

Check if Vulnerable:

Check IrfanView version via Help > About. If version is below 4.67, system is vulnerable.

Check Version:

irfanview.exe /?

Verify Fix Applied:

Verify IrfanView version is 4.67 or higher in Help > About dialog.

📡 Detection & Monitoring

Log Indicators:

  • IrfanView crash logs with memory access violations
  • Unexpected IrfanView process spawning child processes

Network Indicators:

  • Outbound connections from IrfanView process to suspicious IPs
  • DNS requests for known malicious domains from IrfanView

SIEM Query:

process_name:"i_view32.exe" OR process_name:"i_view64.exe" AND (event_id:1000 OR event_id:1001) | where version < "4.67"

🔗 References

📤 Share & Export