CVE-2012-0897

EUVD-2012-0920
Stack-based buffer overflow in the JPEG2000 plugin in IrfanView PlugIns before 4.33 allows remote attackers to execute arbitrary code via a JPEG2000 (JP2) file with a crafted Quantization Default (QCD) marker segment.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
6.8 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
Base Score
CVSS 3.x
EPSS Score
Percentile: 98%
Affected Products (NVD)
VendorProductVersion
irfanviewirfanview
𝑥
≤ 4.32
irfanviewirfanview
1.70
irfanviewirfanview
1.75
irfanviewirfanview
1.80
irfanviewirfanview
1.85
irfanviewirfanview
1.90
irfanviewirfanview
1.95
irfanviewirfanview
1.97
irfanviewirfanview
1.98
irfanviewirfanview
1.98a:a
irfanviewirfanview
1.99
irfanviewirfanview
2.00
irfanviewirfanview
2.05
irfanviewirfanview
2.07
irfanviewirfanview
2.10
irfanviewirfanview
2.12
irfanviewirfanview
2.15
irfanviewirfanview
2.17
irfanviewirfanview
2.18
irfanviewirfanview
2.20
irfanviewirfanview
2.22
irfanviewirfanview
2.25
irfanviewirfanview
2.27
irfanviewirfanview
2.30
irfanviewirfanview
2.32
irfanviewirfanview
2.35
irfanviewirfanview
2.37
irfanviewirfanview
2.40
irfanviewirfanview
2.50
irfanviewirfanview
2.52
irfanviewirfanview
2.55
irfanviewirfanview
2.60
irfanviewirfanview
2.62
irfanviewirfanview
2.63
irfanviewirfanview
2.65
irfanviewirfanview
2.66
irfanviewirfanview
2.68
irfanviewirfanview
2.80
irfanviewirfanview
2.82
irfanviewirfanview
2.83
irfanviewirfanview
2.85
irfanviewirfanview
2.90
irfanviewirfanview
2.92
irfanviewirfanview
2.95
irfanviewirfanview
2.97
irfanviewirfanview
2.98
irfanviewirfanview
3.00
irfanviewirfanview
3.0.7
irfanviewirfanview
3.02
irfanviewirfanview
3.05
irfanviewirfanview
3.07
irfanviewirfanview
3.10
irfanviewirfanview
3.12
irfanviewirfanview
3.15
irfanviewirfanview
3.17
irfanviewirfanview
3.20
irfanviewirfanview
3.21
irfanviewirfanview
3.25
irfanviewirfanview
3.30
irfanviewirfanview
3.33
irfanviewirfanview
3.35
irfanviewirfanview
3.36
irfanviewirfanview
3.50
irfanviewirfanview
3.51
irfanviewirfanview
3.60
irfanviewirfanview
3.61
irfanviewirfanview
3.70
irfanviewirfanview
3.75
irfanviewirfanview
3.80
irfanviewirfanview
3.85
irfanviewirfanview
3.90
irfanviewirfanview
3.91
irfanviewirfanview
3.92
irfanviewirfanview
3.95
irfanviewirfanview
3.97
irfanviewirfanview
3.98
irfanviewirfanview
3.99
irfanviewirfanview
4.00
irfanviewirfanview
4.10
irfanviewirfanview
4.20
irfanviewirfanview
4.22
irfanviewirfanview
4.23
irfanviewirfanview
4.25
irfanviewirfanview
4.27
irfanviewirfanview
4.28
irfanviewirfanview
4.30
𝑥
= Vulnerable software versions