CVE-2026-27168 PUBLISHED

SAIL: Heap-based Buffer Overflow in Sail-codecs-xwd

Assigner: GitHub_M
Reserved: 18.02.2026 Published: 20.02.2026 Updated: 20.02.2026

SAIL is a cross-platform library for loading and saving images with support for animation, metadata, and ICC profiles. All versions are vulnerable to Heap-based Buffer Overflow through the XWD parser's use of the bytes_per_line value. The value os read directly from the file as the read size in io->strict_read(), and is never compared to the actual size of the destination buffer. An attacker can provide an XWD file with an arbitrarily large bytes_per_line, causing a massive write operation beyond the buffer heap allocated for the image pixels. The issue did not have a fix at the time of publication.

Metrics

CVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS Score: 8.8

Product Status

Vendor HappySeaFox
Product sail
Versions
  • Version <= 0.9.10 is affected

References

Problem Types

  • CWE-122: Heap-based Buffer Overflow CWE