A memory corruption vulnerability exists in the PCX Image Decoding functionality of the SAIL Image Decoding Library v0.9.8. When decoding the image data from a specially crafted .pcx file, a heap-based buffer overflow can occur which allows for remote code execution. An attacker will need to convince the library to read a file to trigger this vulnerability.
References
Link | Resource |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2025-2217 | Exploit Third Party Advisory |
Configurations
History
02 Sep 2025, 17:13
Type | Values Removed | Values Added |
---|---|---|
First Time |
Sail
Sail sail |
|
References | () https://talosintelligence.com/vulnerability_reports/TALOS-2025-2217 - Exploit, Third Party Advisory | |
CPE | cpe:2.3:a:sail:sail:0.9.8:*:*:*:*:*:*:* | |
Summary |
|
25 Aug 2025, 20:24
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-25 15:15
Updated : 2025-09-02 17:13
NVD link : CVE-2025-35984
Mitre link : CVE-2025-35984
CVE.ORG link : CVE-2025-35984
JSON object : View
Products Affected
sail
- sail
CWE
CWE-122
Heap-based Buffer Overflow