1. Symantec/
  2. Security Response/
  3. Attack Signatures/
  4. HTTP Leadtools SDK ActiveX File Overwrite

HTTP Leadtools SDK ActiveX File Overwrite

Severity: High

This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.

Description

This signature detects attempts to exploit a file overwrite vulnerability in LeadTools.

Additional Information

LeadTools Raster Image is an SDK for imaging applications.

LeadTools Raster Thumbnail Object Library ActiveX control is prone to an arbitrary file-overwrite vulnerability because the application fails to properly sanitize user-supplied input.

This issue occurs because the application does not properly verify the filename passed to the 'WriteDataToFile' method of the 'LTRTM14e.DLL' ActiveX control.

This issue resides in the ActiveX control with CLSID: {00140B9B-B1BA-11CE-ABC6-F5B2E79D9E3F}.

Successfully exploiting this issue allows remote attackers to overwrite arbitrary files on the victim computer in the context of the application using the ActiveX control (typically Internet Explorer).

Thumbnail Object Library ActiveX control 14.5.0.44 is vulnerable to this issue; other versions may also be affected.

Affected

  • LeadTools Raster Image SDK 14.5
  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube