SAIL is a cross-platform library for loading and saving images with support for animation, metadata, and ICC profiles. All versions are vulnerable to Heap-based Buffer Overflow through the XWD parser's use of the bytes_per_line value. The value os read directly from the file as the read size in io->strict_read(), and is never compared to the actual size of the destination buffer. An attacker can provide an XWD file with an arbitrarily large bytes_per_line, causing a massive write operation beyond the buffer heap allocated for the image pixels. The issue did not have a fix at the time of publication.
References
| Link | Resource |
|---|---|
| https://github.com/HappySeaFox/sail/security/advisories/GHSA-3g38-x2pj-mv55 | Exploit Vendor Advisory |
Configurations
History
02 Mar 2026, 13:28
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Sail
Sail sail |
|
| CPE | cpe:2.3:a:sail:sail:*:*:*:*:*:*:*:* | |
| References | () https://github.com/HappySeaFox/sail/security/advisories/GHSA-3g38-x2pj-mv55 - Exploit, Vendor Advisory | |
| Summary |
|
21 Feb 2026, 00:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-21 00:16
Updated : 2026-03-02 13:28
NVD link : CVE-2026-27168
Mitre link : CVE-2026-27168
CVE.ORG link : CVE-2026-27168
JSON object : View
Products Affected
sail
- sail
CWE
CWE-122
Heap-based Buffer Overflow
