Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Hackers Can Target LEADTOOLS Users With Malicious Image Files

Cisco Talos security researchers have discovered multiple vulnerabilities in the LEADTOOLS imaging toolkits that could lead to code execution on the victim system.

Cisco Talos security researchers have discovered multiple vulnerabilities in the LEADTOOLS imaging toolkits that could lead to code execution on the victim system.

Developed by LEAD Technologies Inc., LEADTOOLS represents a collection of toolkits for integrating document, medical, multimedia and imaging technologies into applications tailored for desktop, server, and mobile devices. An SDK and various libraries provide support for multiple operating systems.

According to Talos researchers, multiple vulnerabilities discovered in LEADTOOLS could allow a malicious actor to cause denial-of-service (DoS) conditions and even execute code remotely on an affected system.

The first of these bugs is a heap out-of-bounds write vulnerability in the TIF-parsing functionality of LEADTOOLS 20. Tracked as CVE-2019-5084, the vulnerability can be exploited with the help of a specially crafted TIF image to cause an offset beyond the bounds of a heap allocation to be written.

The CMP-parsing functionality of LEADTOOLS 20, Talos reports, is impacted by an integer underflow security flaw. Tracked as CVE-2019-5099, the issue can be exploited using a specially crafted CMP image file.

Cisco’s researchers also discovered that the BMP header parsing functionality of LEADTOOLS 20 is impacted by an integer overflow bug (tracked as CVE-2019-5100), and that the JPEG2000-parsing functionality of LEADTOOLS 20 has an exploitable heap overflow vulnerability (CVE-2019-5125).

The same as with the first two bugs, an attacker looking to trigger these weaknesses would need specially crafted BMP and J2K image files.

All four vulnerabilities are rated High severity and have a CVSS score of 8.8.

Advertisement. Scroll to continue reading.

Talos’ security researchers found these bugs in LEADTOOLS 20.0.2019.3.15 in early September and reported them to the vendor on September 10. A patch was released earlier this week.

Related: Hackers Can Target Able2Extract Users With Malicious Image Files

Related: Cisco Finds 11 Vulnerabilities in Schneider Electric Modicon Controllers

Related: AMD Radeon Driver Flaw Leads to VM Escape

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Learn how the LOtL threat landscape has evolved, why traditional endpoint hardening methods fall short, and how adaptive, user-aware approaches can reduce risk.

Watch Now

Join the summit to explore critical threats to public cloud infrastructure, APIs, and identity systems through discussions, case studies, and insights into emerging technologies like AI and LLMs.

Register

People on the Move

Matthew Cowell has assumed the role of VP of Strategic Alliances at Nozomi Networks. He previously served in the same role at Dragos.

Bret Arsenault is retiring from his full-time role after 35 years at Microsoft.

Social engineering defense platform Doppel has appointed Bobby Ford as Chief Strategy and Experience Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.