Security Research

We are an independent information security consultancy, specialising in network and web application penetration testing.

Get in touch >

Research and Advisories

ReactionIS are committed to research and development in the information security field. Please feel free to browse and download our advisories and whitepapers.

Irfanview Plugins JLS File Format Heap Overflow

IrfanView Formats PlugIn is prone to an overflow condition. The JLS Plugin (jpeg_ls.dll) library fails to properly sanitize user-supplied input resulting in a heap-based buffer overflow. With a specially crafted JLS compressed image file, a context-dependent attacker could potentially execute arbitrary code. Read the full advisory here.

GIMP FIT File Format DoS

There is a file handling DoS in GIMP (the GNU Image Manipulation Program) for the 'fit' file format affecting all versions (Windows and Linux) up to and including 2.8.0. A file in the fit format with a malformed 'XTENSION' header will cause a crash in the GIMP program. Read the full advisory here.

ScriptFu Buffer Overflow in GIMP <= 2.6

This buffer overflow flaw in the GIMP (GNU Image Manipulation Program) ScriptFu server in Windows and Linux builds could result in remote code execution on affected machines. Found by Joseph Sheridan, Director at Reaction. More details on this issue are published here. Proof of concept code is available here.

Wireless Security

This paper discusses the security implications of using the various wireless protocols and includes demonstrations of effective attacks on common wireless setups. The security risks of wireless technologies are presented to the reader and recommendations are made to counter these threats to safeguard networks and data. This paper included information about war driving attacks, WEP and WPA wireless access protocols, weaknesses in WPS (WiFi Protected Setup), rogue access points and evil twin attacks. A VirtualBox Backtrack 5 image and a USB ALFA wireless card were used as a platform for the demonstrations. Download this paper here: Wireless Security.

Defending the Cloud

This whitepaper aims to assess the security implications of moving resources into a cloud computing environment, and suggests recommendations for IT managers who are considering making this switch. The paper focuses on three major changes that occur in the shift from traditional networks into the cloud, namely the virtualisation layer, multi-tenancy and outsourcing. A number of recommendations are made that should be implemented as a supplement to enterprise security practices, including hardening the hypervisor, securing communication between virtual machines, guarding shared storage and memory, and ensuring the provider can cater for your security and compliance requirements. Download this paper here: Defending the Cloud.