Vulnerability Spotlight: Remote code execution vulnerabilities in LEADTOOLS 20

Vulnerability Spotlight: Remote code execution vulnerabilities in LEADTOOLS 20

Cory Duplantis of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw.

Cisco Talos recently discovered a remote code execution vulnerability in the LEADTOOLS line of imaging toolkits. LEADTOOLS is a collection of toolkits designed to perform a variety of functions aimed at integrating documents, multimedia and imaging technologies into applications. All of the


software is produced by LEAD Technologies Inc. LEADTOOLS offers prebuilt and portable libraries with an SDK for most platforms (Windows, Linux, Android, etc.), that are all geared toward building applications for medical systems. This specific vulnerability exists in the ANI file format parser inside LEADTOOLS.

In accordance with our coordinated disclosure policy, Cisco Talos worked with LEAD Technologies to ensure that these issues are resolved and that an update is available for affected customers.

Vulnerability details


Leadtools image parser animated icon code execution vulnerability (TALOS-2020-1009/CVE-2020-6089)

An exploitable code execution vulnerability exists in the ANI file format parser of Leadtools 20. A specially crafted ANI file can cause a buffer overflow resulting in remote code execution. An attacker can provide a malicious file to trigger this vulnerability.

Read the complete vulnerability advisory here for additional information.

Versions tested


Talos tested and confirmed that version 20 of LEADTOOLS is affected by these vulnerabilities.

Coverage


The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a fu ..

Support the originator by clicking the read the rest link below.