CVE-2022-23400

7.1 HIGH

📋 TL;DR

A stack-based buffer overflow vulnerability in Accusoft ImageGear's PSD file parser allows attackers to cause denial of service or potentially leak information by providing malicious files. This affects applications using ImageGear 19.10 for PSD file processing.

💻 Affected Systems

Products:
  • Accusoft ImageGear
Versions: 19.10
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Any application using ImageGear 19.10 library for PSD file parsing is vulnerable. The vulnerability is in the core parsing functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise if the application processes attacker-controlled PSD files with insufficient memory protections.

🟠

Likely Case

Denial of service (application crash) or information disclosure through memory leaks when processing malicious PSD files.

🟢

If Mitigated

Limited impact with proper sandboxing, memory protections (ASLR/DEP), and file validation in place.

🌐 Internet-Facing: MEDIUM - Requires file upload/processing functionality to be exposed, but many web applications handle image uploads.
🏢 Internal Only: LOW - Requires user interaction to open malicious files or automated processing of untrusted content.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires delivering a malicious PSD file to a vulnerable application. No public exploit code is available, but the vulnerability details are published.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 19.11 or later

Vendor Advisory: https://www.accusoft.com/products/imagegear/

Restart Required: Yes

Instructions:

1. Download ImageGear 19.11 or later from Accusoft. 2. Uninstall current ImageGear 19.10. 3. Install the updated version. 4. Restart any applications using ImageGear.

🔧 Temporary Workarounds

Disable PSD file processing

all

Configure applications to reject or not process PSD files through ImageGear

Implement file validation

all

Add server-side validation to reject malformed PSD files before processing

🧯 If You Can't Patch

  • Implement strict file upload controls and validation for PSD files
  • Run ImageGear in sandboxed environments with limited privileges

🔍 How to Verify

Check if Vulnerable:

Check if ImageGear 19.10 is installed and used by applications for PSD processing

Check Version:

Check application dependencies or contact vendor for version information

Verify Fix Applied:

Verify ImageGear version is 19.11 or later and test with known malicious PSD samples

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when processing PSD files
  • Memory access violation errors in logs

Network Indicators:

  • Unusual PSD file uploads to web applications
  • Large or malformed PSD file transfers

SIEM Query:

source="application_logs" AND ("ImageGear" OR "PSD") AND ("crash" OR "access violation" OR "buffer overflow")

🔗 References

📤 Share & Export