Vulnerability Details CVE-2026-27168
SAIL is a cross-platform library for loading and saving images with support for animation, metadata, and ICC profiles. All versions are vulnerable to Heap-based Buffer Overflow through the XWD parser's use of the bytes_per_line value. The value os read directly from the file as the read size in io->strict_read(), and is never compared to the actual size of the destination buffer. An attacker can provide an XWD file with an arbitrarily large bytes_per_line, causing a massive write operation beyond the buffer heap allocated for the image pixels. The issue did not have a fix at the time of publication.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 14.0%
CVSS Severity
CVSS v3 Score 8.8
Products affected by CVE-2026-27168
-
cpe:2.3:a:sail:sail:0.9.0
-
cpe:2.3:a:sail:sail:0.9.1
-
cpe:2.3:a:sail:sail:0.9.2
-
cpe:2.3:a:sail:sail:0.9.3
-
cpe:2.3:a:sail:sail:0.9.4
-
cpe:2.3:a:sail:sail:0.9.5
-
cpe:2.3:a:sail:sail:0.9.6
-
cpe:2.3:a:sail:sail:0.9.7
-
cpe:2.3:a:sail:sail:0.9.8
-
cpe:2.3:a:sail:sail:0.9.9