CVE-2020-6151

9.8 CRITICAL

📋 TL;DR

This is a critical memory corruption vulnerability in Accusoft ImageGear's TIFF file parser. Attackers can exploit it by providing specially crafted TIFF files, potentially leading to remote code execution. Any application using ImageGear 19.7 to process TIFF files is vulnerable.

💻 Affected Systems

Products:
  • Accusoft ImageGear
Versions: 19.7
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Any application that uses ImageGear library to process TIFF files is vulnerable. The vulnerability is in the handle_COMPRESSION_PACKBITS function.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with SYSTEM/root privileges, complete system compromise, and potential lateral movement across networks.

🟠

Likely Case

Application crash leading to denial of service, with potential for remote code execution in vulnerable configurations.

🟢

If Mitigated

Application crash with limited impact if proper sandboxing and privilege separation are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Proof-of-concept exploit code is publicly available. Exploitation requires only a malicious TIFF file to be processed by the vulnerable software.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 19.8 or later

Vendor Advisory: https://www.accusoft.com/products/imagegear-collection/imagegear/

Restart Required: Yes

Instructions:

1. Upgrade to ImageGear version 19.8 or later. 2. Replace the vulnerable ImageGear library files. 3. Restart all applications using ImageGear. 4. Recompile applications if using ImageGear as a library.

🔧 Temporary Workarounds

Disable TIFF file processing

all

Configure applications to reject or not process TIFF files using ImageGear

Implement file type validation

all

Add strict file validation before passing to ImageGear library

🧯 If You Can't Patch

  • Implement network segmentation to isolate vulnerable systems
  • Deploy application sandboxing and privilege reduction for ImageGear processes

🔍 How to Verify

Check if Vulnerable:

Check ImageGear library version - if it's 19.7, the system is vulnerable. Check if applications use ImageGear for TIFF processing.

Check Version:

Check application dependencies or library files for ImageGear version information

Verify Fix Applied:

Verify ImageGear version is 19.8 or later. Test with known malicious TIFF files to ensure they are rejected or processed safely.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when processing TIFF files
  • Memory access violation errors in application logs
  • Unexpected process termination

Network Indicators:

  • Inbound TIFF file transfers to vulnerable systems
  • Outbound connections from ImageGear processes after TIFF processing

SIEM Query:

source="application_logs" AND ("ImageGear" OR "TIFF") AND ("crash" OR "access violation" OR "segmentation fault")

🔗 References

📤 Share & Export