CVE-2024-11539

7.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious DXF files in IrfanView. Attackers can achieve full system compromise through memory corruption in the DXF parsing component. All users running vulnerable versions of IrfanView are affected.

💻 Affected Systems

Products:
  • IrfanView
Versions: Versions prior to 4.67
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All Windows versions supported by IrfanView are affected. Vulnerability requires user interaction to open malicious DXF file.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with attacker executing arbitrary code as the current user, potentially leading to data theft, ransomware deployment, or lateral movement.

🟠

Likely Case

Malicious actors deliver weaponized DXF files via email or web downloads, leading to system compromise when users open them.

🟢

If Mitigated

Limited to denial of service or application crash if memory corruption doesn't lead to reliable code execution.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction but weaponization is likely given the RCE nature. ZDI has confirmed the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: IrfanView 4.67

Vendor Advisory: https://www.irfanview.com/main_history.htm

Restart Required: No

Instructions:

1. Download IrfanView 4.67 or later from official website. 2. Run installer. 3. Follow installation prompts. 4. Verify version in Help > About.

🔧 Temporary Workarounds

Disable DXF file association

windows

Remove IrfanView as default handler for DXF files to prevent automatic opening

Control Panel > Default Programs > Set Associations > Find .DXF > Change to different program

Block DXF files at perimeter

all

Prevent DXF files from entering the network via email or web gateways

🧯 If You Can't Patch

  • Implement application whitelisting to prevent IrfanView execution
  • Use Group Policy to block DXF file execution via IrfanView

🔍 How to Verify

Check if Vulnerable:

Check IrfanView version in Help > About menu. If version is below 4.67, system is vulnerable.

Check Version:

irfanview.exe /?

Verify Fix Applied:

Verify IrfanView version is 4.67 or higher in Help > About menu.

📡 Detection & Monitoring

Log Indicators:

  • IrfanView process spawning child processes unexpectedly
  • Multiple DXF file open attempts from same source

Network Indicators:

  • Unusual outbound connections from IrfanView process
  • DXF file downloads from suspicious sources

SIEM Query:

process_name:"i_view32.exe" OR process_name:"i_view64.exe" AND (parent_process:explorer.exe OR cmdline:*dxf*)

🔗 References

📤 Share & Export