プラットフォーム
c
コンポーネント
sdl_image
修正版
996.0.1
CVE-2026-35444 は、SDL_image ライブラリのバージョン 996bf12888925932daace576e09c3053410896f8 以前に存在するバッファオーバーフローの脆弱性です。この脆弱性は、XCF ファイルの処理中に、カラーマップのサイズを超えたピクセルインデックスが使用されることで発生します。これにより、ヒープ領域からの情報漏洩が発生する可能性があります。バージョン 2.0.6 で修正されています。
An attacker can exploit this vulnerability by crafting a malicious XCF image file. When SDLimage attempts to decode this file, the out-of-bounds read allows the attacker to potentially leak up to 762 bytes of heap memory. This leaked data, written into the output surface pixel data, could be observable in the rendered image, potentially revealing sensitive information. While direct code execution is unlikely, the information disclosure could be a stepping stone for further attacks, particularly in applications that rely on SDLimage to display user-provided images. The impact is amplified in scenarios where the application processes untrusted image data without proper sanitization.
This CVE has been publicly disclosed. As of the current date, there are no known public exploits or active campaigns targeting this vulnerability. It is not currently listed on the CISA KEV catalog. The CVSS score of 7.1 (HIGH) indicates a significant potential for exploitation if an attacker gains access to a vulnerable system and can provide a malicious XCF file.
Applications and systems that utilize SDLimage to load and display images, particularly those processing user-uploaded or externally sourced XCF files, are at risk. This includes game development environments, multimedia applications, and any software relying on SDLimage for image rendering.
• linux / server:
ps aux | grep sdl_image• c / generic: Examine SDLimage source code (src/IMGxcf.c) for the dolayersurface() function and the validation of colormap indices.
• generic web: Monitor web server access logs for requests containing XCF files, especially those originating from untrusted sources.
disclosure
エクスプロイト状況
EPSS
0.01% (3% パーセンタイル)
CISA SSVC
The primary mitigation is to upgrade to SDL_image version 2.0.6 or later, which contains the fix for this vulnerability. If upgrading is not immediately feasible, consider implementing input validation to restrict the types of image files processed by the application. Specifically, validate the XCF file format and its contents before attempting to decode it. WAFs or proxies can be configured to block requests containing potentially malicious XCF files, although this is a less robust solution. Monitor application logs for unusual memory access patterns or errors related to image decoding, which could indicate exploitation attempts. After upgrading, confirm the fix by attempting to load a known malicious XCF file and verifying that the out-of-bounds read no longer occurs.
Actualice a la versión 2.0.6 o posterior para mitigar el desbordamiento del búfer de la pila. Esta actualización corrige la validación de los índices de la paleta de colores, evitando así el acceso fuera de los límites de la memoria.
脆弱性分析と重要アラートをメールでお届けします。
CVE-2026-35444 は、SDL_image ライブラリの特定のバージョンにおけるバッファオーバーフローの脆弱性です。
SDL_image ライブラリのバージョンが 2.0.6 以前の場合、この脆弱性の影響を受ける可能性があります。
SDL_image ライブラリをバージョン 2.0.6 以降にアップデートすることで修正できます。
CVSS ベクトル