CVE-2024-11551

7.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious DXF files in IrfanView. The memory corruption flaw in DXF file parsing can lead to complete system compromise. All IrfanView users who open untrusted DXF files are affected.

💻 Affected Systems

Products:
  • IrfanView
Versions: Versions prior to 4.67
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All Windows versions running vulnerable IrfanView versions are affected. The vulnerability requires user interaction to open malicious files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the victim's machine, data theft, ransomware deployment, and lateral movement within the network.

🟠

Likely Case

Malware installation leading to data exfiltration, credential theft, and persistence mechanisms being established on the compromised system.

🟢

If Mitigated

Limited impact with proper application sandboxing and user privilege restrictions, potentially resulting in application crash but no code execution.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user interaction but the vulnerability is straightforward to weaponize once technical details are understood. ZDI has confirmed the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: IrfanView 4.67 and later

Vendor Advisory: https://www.irfanview.com/main_history.htm

Restart Required: No

Instructions:

1. Download latest IrfanView from official website. 2. Run installer. 3. Follow installation prompts. 4. Verify version is 4.67 or higher.

🔧 Temporary Workarounds

Disable DXF file association

windows

Remove IrfanView as default handler for DXF files to prevent automatic opening

Control Panel > Default Programs > Set Associations > Find .DXF > Change to another program

Application sandboxing

windows

Run IrfanView in restricted environment to limit potential damage

🧯 If You Can't Patch

  • Block DXF files at network perimeter and email gateways
  • Implement application whitelisting to prevent IrfanView execution

🔍 How to Verify

Check if Vulnerable:

Open IrfanView, go to Help > About, check if version is below 4.67

Check Version:

irfanview.exe /?

Verify Fix Applied:

Confirm IrfanView version is 4.67 or higher in Help > About dialog

📡 Detection & Monitoring

Log Indicators:

  • IrfanView crash logs with memory access violations
  • Unexpected IrfanView process spawning child processes

Network Indicators:

  • Downloads of DXF files from untrusted sources
  • Outbound connections from IrfanView process

SIEM Query:

Process Creation where Image ends with 'i_view64.exe' or 'i_view32.exe' and CommandLine contains '.dxf'

🔗 References

📤 Share & Export