A memory corruption vulnerability exists in the PSD Image Decoding functionality of the SAIL Image Decoding Library v0.9.8. When loading a specially crafted .psd file, an integer overflow can be made to occur when calculating the stride for decoding. Afterwards, this will cause a heap-based buffer to overflow when decoding the image which can lead to remote code execution. An attacker will need to convince the library to read a file to trigger this vulnerability.
References
| Link | Resource |
|---|---|
| https://talosintelligence.com/vulnerability_reports/TALOS-2025-2218 | Exploit Third Party Advisory |
Configurations
History
02 Sep 2025, 17:13
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://talosintelligence.com/vulnerability_reports/TALOS-2025-2218 - Exploit, Third Party Advisory | |
| First Time |
Sail sail
Sail |
|
| CPE | cpe:2.3:a:sail:sail:0.9.8:*:*:*:*:*:*:* | |
| Summary |
|
25 Aug 2025, 20:24
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-08-25 15:15
Updated : 2025-09-02 17:13
NVD link : CVE-2025-53510
Mitre link : CVE-2025-53510
CVE.ORG link : CVE-2025-53510
JSON object : View
Products Affected
sail
- sail
CWE
CWE-680
Integer Overflow to Buffer Overflow
