Security Experts:

Connect with us

Hi, what are you looking for?



Hackers Can Target LEADTOOLS Users With Malicious Image Files

Cisco Talos security researchers have discovered multiple vulnerabilities in the LEADTOOLS imaging toolkits that could lead to code execution on the victim system.

Cisco Talos security researchers have discovered multiple vulnerabilities in the LEADTOOLS imaging toolkits that could lead to code execution on the victim system.

Developed by LEAD Technologies Inc., LEADTOOLS represents a collection of toolkits for integrating document, medical, multimedia and imaging technologies into applications tailored for desktop, server, and mobile devices. An SDK and various libraries provide support for multiple operating systems.

According to Talos researchers, multiple vulnerabilities discovered in LEADTOOLS could allow a malicious actor to cause denial-of-service (DoS) conditions and even execute code remotely on an affected system.

The first of these bugs is a heap out-of-bounds write vulnerability in the TIF-parsing functionality of LEADTOOLS 20. Tracked as CVE-2019-5084, the vulnerability can be exploited with the help of a specially crafted TIF image to cause an offset beyond the bounds of a heap allocation to be written.

The CMP-parsing functionality of LEADTOOLS 20, Talos reports, is impacted by an integer underflow security flaw. Tracked as CVE-2019-5099, the issue can be exploited using a specially crafted CMP image file.

Cisco’s researchers also discovered that the BMP header parsing functionality of LEADTOOLS 20 is impacted by an integer overflow bug (tracked as CVE-2019-5100), and that the JPEG2000-parsing functionality of LEADTOOLS 20 has an exploitable heap overflow vulnerability (CVE-2019-5125).

The same as with the first two bugs, an attacker looking to trigger these weaknesses would need specially crafted BMP and J2K image files.

All four vulnerabilities are rated High severity and have a CVSS score of 8.8.

Talos’ security researchers found these bugs in LEADTOOLS 20.0.2019.3.15 in early September and reported them to the vendor on September 10. A patch was released earlier this week.

Related: Hackers Can Target Able2Extract Users With Malicious Image Files

Related: Cisco Finds 11 Vulnerabilities in Schneider Electric Modicon Controllers

Related: AMD Radeon Driver Flaw Leads to VM Escape

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Expert Insights

Related Content

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

IoT Security

Lexmark warns of a remote code execution (RCE) vulnerability impacting over 120 printer models, for which PoC code has been published.

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Email Security

Microsoft is urging customers to install the latest Exchange Server updates and harden their environments to prevent malicious attacks.

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.


Security researchers have observed an uptick in attacks targeting CVE-2021-35394, an RCE vulnerability in Realtek Jungle SDK.


Google has awarded more than $25,000 to the researchers who reported the vulnerabilities patched with the release of the latest Chrome update.

Mobile & Wireless

Apple’s iOS 12.5.7 update patches CVE-2022-42856, an actively exploited vulnerability, in old iPhones and iPads.