HTTP: LEADTOOLS Raster Twain LtocxTwainu.dll Buffer Overflow

This signature detects attempts to use unsafe ActiveX controls in the LEADTOOLS Raster Twain LtocxTwainu.dll. An attacker can create a malicious Web site containing Web pages with dangerous ActiveX controls, which if accessed by a victim, allows the attacker to gain control of the victim's client browser.

Extended Description

The LEADTOOLS Imaging ActiveX control is prone to a buffer-overflow vulnerability because the application fails to bounds-check user-supplied data before copying it into an insufficiently sized buffer. Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the application using the ActiveX control (typically Internet Explorer). Failed exploit attempts likely result in denial-of-service conditions. LEADTOOLS Imaging ActiveX control 16.5 is vulnerable to this issue; other versions may also be affected.

Affected Products

Leadtools imaging_activex

References

BugTraq: 42823

Short Name
HTTP:STC:ACTIVEX:LTOCXTWAINU
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Buffer LEADTOOLS LtocxTwainu.dll Overflow Raster Twain bid:42823
Release Date
11/19/2010
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
False Positive
Unknown
Vendors

Leadtools

Found a potential security threat?