CVE-2024-9767

7.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious SID files in IrfanView. The flaw exists in SID file parsing where improper input validation leads to out-of-bounds reads that can be leveraged for code execution. All IrfanView users who open untrusted SID files are affected.

💻 Affected Systems

Products:
  • IrfanView
Versions: Versions prior to the patched release (specific version unknown from provided data)
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires user interaction to open malicious SID file. All Windows versions running vulnerable IrfanView are affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining the same privileges as the IrfanView process, potentially leading to malware installation, data theft, or lateral movement.

🟠

Likely Case

Local privilege escalation or arbitrary code execution within the user's context, allowing file system access, credential theft, or persistence mechanisms.

🟢

If Mitigated

Application crash or denial of service if exploit attempts fail or are blocked by security controls.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious file). The vulnerability is memory corruption-based requiring specific exploit development.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown specific version - check IrfanView website for latest release

Vendor Advisory: https://www.irfanview.com/

Restart Required: No

Instructions:

1. Visit https://www.irfanview.com/
2. Download and install the latest version of IrfanView
3. Replace any existing vulnerable installations

🔧 Temporary Workarounds

Disable SID file association

windows

Remove IrfanView as the default handler for SID files to prevent automatic opening

Control Panel > Default Programs > Set Default Programs > Select IrfanView > Choose defaults for this program > Uncheck .SID

Block SID files at perimeter

all

Configure email/web gateways to block .SID file attachments

🧯 If You Can't Patch

  • Implement application whitelisting to prevent IrfanView execution
  • Use endpoint protection with exploit prevention capabilities

🔍 How to Verify

Check if Vulnerable:

Check IrfanView version in Help > About. If not the latest version, assume vulnerable.

Check Version:

irfanview.exe /?

Verify Fix Applied:

Verify IrfanView version matches latest release from official website.

📡 Detection & Monitoring

Log Indicators:

  • IrfanView crash logs
  • Windows Application Error events with IrfanView process

Network Indicators:

  • Downloads of .SID files from untrusted sources
  • Unusual outbound connections after IrfanView execution

SIEM Query:

process_name:"i_view32.exe" OR process_name:"i_view64.exe" AND (file_extension:".sid" OR event_id:1000)

🔗 References

📤 Share & Export