CVE-2024-11555

7.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious DXF files in IrfanView. The flaw exists in DXF file parsing where improper data validation enables buffer overflow. Users of vulnerable IrfanView versions are affected when processing untrusted DXF files.

💻 Affected Systems

Products:
  • IrfanView
Versions: Versions prior to 4.67
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All Windows versions running vulnerable IrfanView are affected. The vulnerability requires user interaction to open malicious files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining the same privileges as the user running IrfanView, potentially leading to data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Local privilege escalation leading to user account compromise, data exfiltration, and lateral movement within the network.

🟢

If Mitigated

Limited impact with application sandboxing or low-privilege user accounts, potentially causing application crash but not system compromise.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user interaction but is technically straightforward once a malicious DXF file is crafted. The ZDI advisory suggests active exploitation is likely.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: IrfanView 4.67 and later

Vendor Advisory: https://www.irfanview.com/main_history.htm

Restart Required: No

Instructions:

1. Download IrfanView 4.67 or later from official website
2. Run the installer
3. Follow installation prompts
4. Verify version in Help > About

🔧 Temporary Workarounds

Disable DXF file association

windows

Remove IrfanView as default handler for DXF files to prevent automatic opening

Control Panel > Default Programs > Set Default Programs > Select IrfanView > Choose defaults for this program > Uncheck .dxf

Block DXF files at perimeter

all

Prevent DXF files from entering the network via email or web downloads

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of IrfanView
  • Use Windows Defender Application Control or AppLocker to restrict IrfanView execution to trusted paths only

🔍 How to Verify

Check if Vulnerable:

Open IrfanView, go to Help > About, check if version is earlier than 4.67

Check Version:

irfanview.exe /?

Verify Fix Applied:

Confirm IrfanView version is 4.67 or later in Help > About dialog

📡 Detection & Monitoring

Log Indicators:

  • IrfanView crash logs with DXF-related errors
  • Windows Application Event Logs showing IrfanView crashes (Event ID 1000)

Network Indicators:

  • Unusual outbound connections from systems running IrfanView
  • DXF file downloads from untrusted sources

SIEM Query:

source="*irfanview*" AND (event_id=1000 OR "dxf" OR "crash")

🔗 References

📤 Share & Export