Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2026-27168

SAIL is a cross-platform library for loading and saving images with support for animation, metadata, and ICC profiles. All versions are vulnerable to Heap-based Buffer Overflow through the XWD parser's use of the bytes_per_line value. The value os read directly from the file as the read size in io->strict_read(), and is never compared to the actual size of the destination buffer. An attacker can provide an XWD file with an arbitrarily large bytes_per_line, causing a massive write operation beyond the buffer heap allocated for the image pixels. The issue did not have a fix at the time of publication.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 14.0%
CVSS Severity
CVSS v3 Score 8.8
Products affected by CVE-2026-27168
  • Sail » Sail » Version: 0.9.0
    cpe:2.3:a:sail:sail:0.9.0
  • Sail » Sail » Version: 0.9.1
    cpe:2.3:a:sail:sail:0.9.1
  • Sail » Sail » Version: 0.9.2
    cpe:2.3:a:sail:sail:0.9.2
  • Sail » Sail » Version: 0.9.3
    cpe:2.3:a:sail:sail:0.9.3
  • Sail » Sail » Version: 0.9.4
    cpe:2.3:a:sail:sail:0.9.4
  • Sail » Sail » Version: 0.9.5
    cpe:2.3:a:sail:sail:0.9.5
  • Sail » Sail » Version: 0.9.6
    cpe:2.3:a:sail:sail:0.9.6
  • Sail » Sail » Version: 0.9.7
    cpe:2.3:a:sail:sail:0.9.7
  • Sail » Sail » Version: 0.9.8
    cpe:2.3:a:sail:sail:0.9.8
  • Sail » Sail » Version: 0.9.9
    cpe:2.3:a:sail:sail:0.9.9


Contact Us

Shodan ® - All rights reserved