CVE-2021-21795
📋 TL;DR
A heap-based buffer overflow vulnerability in Accusoft ImageGear's PSD parsing allows remote code execution when processing malicious files. This affects systems using ImageGear 19.9 for image processing, potentially enabling attackers to take full control of vulnerable systems.
💻 Affected Systems
- Accusoft ImageGear
📦 What is this software?
Imagegear by Accusoft
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution with SYSTEM/root privileges leading to complete system compromise, data theft, and lateral movement.
Likely Case
Remote code execution with application user privileges, allowing file system access, data exfiltration, and persistence establishment.
If Mitigated
Denial of service through application crash if memory protections are enabled, but no code execution.
🎯 Exploit Status
Proof-of-concept available in Talos advisory. Exploitation requires user to open malicious file but no authentication needed.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 19.10 or later
Vendor Advisory: https://www.accusoft.com/products/imagegear/
Restart Required: Yes
Instructions:
1. Download ImageGear 19.10+ from Accusoft portal. 2. Uninstall current version. 3. Install updated version. 4. Restart affected applications/services.
🔧 Temporary Workarounds
File Type Restriction
allBlock PSD files with ICC profiles at network perimeter and application level.
Application Sandboxing
allRun ImageGear applications with reduced privileges and memory protections.
🧯 If You Can't Patch
- Implement strict file upload validation rejecting PSD files with ICC profiles
- Deploy application control to prevent execution of ImageGear processes from untrusted locations
🔍 How to Verify
Check if Vulnerable:
Check ImageGear version in application dependencies or library files for version 19.9.
Check Version:
Check application manifest or library properties for ImageGear version information.
Verify Fix Applied:
Verify ImageGear version is 19.10 or higher and test with known malicious PSD files.
📡 Detection & Monitoring
Log Indicators:
- Application crashes with memory access violations
- Unusual process spawning from ImageGear applications
Network Indicators:
- Uploads of PSD files to web applications
- Network connections from ImageGear processes to suspicious IPs
SIEM Query:
source="application.log" AND ("ImageGear" AND ("crash" OR "access violation")) OR process_name="*ImageGear*" AND parent_process!="explorer.exe"