Plateforme
c
Composant
sdl_image
Corrigé dans
996.0.1
SDLimage est une bibliothèque permettant de charger des images de différents formats en tant que surfaces SDL. Cette vulnérabilité, un dépassement de tampon, se situe dans la fonction dolayersurface() et est due à une validation insuffisante des indices de la palette de couleurs lors du traitement de fichiers XCF. L'exploitation réussie peut entraîner une divulgation d'informations via la lecture de données en dehors des limites de la mémoire allouée, affectant les versions de SDLimage inférieures ou égales à 996bf12888925932daace576e09c3053410896f8. Une version corrigée (2.0.6) est disponible.
An attacker can exploit this vulnerability by crafting a malicious XCF image file. When SDLimage attempts to decode this file, the out-of-bounds read allows the attacker to potentially leak up to 762 bytes of heap memory. This leaked data, written into the output surface pixel data, could be observable in the rendered image, potentially revealing sensitive information. While direct code execution is unlikely, the information disclosure could be a stepping stone for further attacks, particularly in applications that rely on SDLimage to display user-provided images. The impact is amplified in scenarios where the application processes untrusted image data without proper sanitization.
This CVE has been publicly disclosed. As of the current date, there are no known public exploits or active campaigns targeting this vulnerability. It is not currently listed on the CISA KEV catalog. The CVSS score of 7.1 (HIGH) indicates a significant potential for exploitation if an attacker gains access to a vulnerable system and can provide a malicious XCF file.
Applications and systems that utilize SDLimage to load and display images, particularly those processing user-uploaded or externally sourced XCF files, are at risk. This includes game development environments, multimedia applications, and any software relying on SDLimage for image rendering.
• linux / server:
ps aux | grep sdl_image• c / generic: Examine SDLimage source code (src/IMGxcf.c) for the dolayersurface() function and the validation of colormap indices.
• generic web: Monitor web server access logs for requests containing XCF files, especially those originating from untrusted sources.
disclosure
Statut de l'Exploit
EPSS
0.01% (percentile 3%)
CISA SSVC
Vecteur CVSS
The primary mitigation is to upgrade to SDL_image version 2.0.6 or later, which contains the fix for this vulnerability. If upgrading is not immediately feasible, consider implementing input validation to restrict the types of image files processed by the application. Specifically, validate the XCF file format and its contents before attempting to decode it. WAFs or proxies can be configured to block requests containing potentially malicious XCF files, although this is a less robust solution. Monitor application logs for unusual memory access patterns or errors related to image decoding, which could indicate exploitation attempts. After upgrading, confirm the fix by attempting to load a known malicious XCF file and verifying that the out-of-bounds read no longer occurs.
Actualice a la versión 2.0.6 o posterior para mitigar el desbordamiento del búfer de la pila. Esta actualización corrige la validación de los índices de la paleta de colores, evitando así el acceso fuera de los límites de la memoria.
Analyses de vulnérabilités et alertes critiques directement dans votre boîte mail.
CVE-2026-35444 is a buffer overflow vulnerability in SDL_image, affecting versions up to 996bf12888925932daace576e09c3053410896f8. It allows attackers to potentially leak heap memory by crafting malicious XCF image files.
You are affected if you are using SDLimage version 996bf12888925932daace576e09c3053410896f8 or earlier. Check your SDLimage version and upgrade if necessary.
Upgrade to SDL_image version 2.0.6 or later to resolve the vulnerability. If upgrading is not possible, implement input validation to restrict the processing of XCF files.
As of now, there are no known public exploits or active campaigns targeting CVE-2026-35444, but the vulnerability poses a significant risk.
Refer to the official SDL_image project website and security advisories for updates and further information regarding CVE-2026-35444.
Téléverse ton fichier de dépendances et découvre instantanément si cette CVE et d'autres te touchent.