TopVuln

High-risk vulnerability digests

CVE-2026-27168

  • HIGH

Details

CVSS v3
8.8
NVD published
2026-02-21 00:16:16
EPSS
<0.1% probability · 21.0th percentile — 2026-04-17
Affected versions
cpe:2.3:a:sail:sail:*:*:*:*:*:*:*:*
Summary
SAIL is a cross-platform library for loading and saving images with support for animation, metadata, and ICC profiles. All versions are vulnerable to Heap-based Buffer Overflow through the XWD parser's use of the bytes_per_line value. The value os read directly from the file as the read size in io->strict_read(), and is never compared to the actual size of the destination buffer. An attacker can provide an XWD file with an arbitrarily large bytes_per_line, causing a massive write operation beyond the buffer heap allocated for the image pixels. The issue did not have a fix at the time of publication.
Remediation
Not available in our cache.
Exploit info
https://github.com/HappySeaFox/sail/security/advisories/GHSA-3g38-x2pj-mv55

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.