### [CVE-2019-5085](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5085) ![](https://img.shields.io/static/v1?label=Product&message=LEADTOOLS%20libltdic.so&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-190%3A%20Integer%20Overflow%20or%20Wraparound&color=brighgreen) ### Description An exploitable code execution vulnerability exists in the DICOM packet-parsing functionality of LEADTOOLS libltdic.so, version 20.0.2019.3.15. A specially crafted packet can cause an integer overflow, resulting in heap corruption. An attacker can send a packet to trigger this vulnerability. ### POC #### Reference - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0877 - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0877 #### Github No PoCs found on GitHub currently.