Plataforma
c
Componente
sdl_image
Corrigido em
996.0.1
O CVE-2026-35444 é uma vulnerabilidade de Buffer Overflow identificada na biblioteca SDLimage, utilizada para carregar imagens em diversos formatos. Essa falha permite a leitura de dados fora dos limites da memória heap, o que pode levar à exposição de informações sensíveis. A vulnerabilidade afeta versões da SDLimage anteriores à 996bf12888925932daace576e09c3053410896f8, sendo corrigida na versão 2.0.6.
An attacker can exploit this vulnerability by crafting a malicious XCF image file. When SDLimage attempts to decode this file, the out-of-bounds read allows the attacker to potentially leak up to 762 bytes of heap memory. This leaked data, written into the output surface pixel data, could be observable in the rendered image, potentially revealing sensitive information. While direct code execution is unlikely, the information disclosure could be a stepping stone for further attacks, particularly in applications that rely on SDLimage to display user-provided images. The impact is amplified in scenarios where the application processes untrusted image data without proper sanitization.
This CVE has been publicly disclosed. As of the current date, there are no known public exploits or active campaigns targeting this vulnerability. It is not currently listed on the CISA KEV catalog. The CVSS score of 7.1 (HIGH) indicates a significant potential for exploitation if an attacker gains access to a vulnerable system and can provide a malicious XCF file.
Applications and systems that utilize SDLimage to load and display images, particularly those processing user-uploaded or externally sourced XCF files, are at risk. This includes game development environments, multimedia applications, and any software relying on SDLimage for image rendering.
• linux / server:
ps aux | grep sdl_image• c / generic: Examine SDLimage source code (src/IMGxcf.c) for the dolayersurface() function and the validation of colormap indices.
• generic web: Monitor web server access logs for requests containing XCF files, especially those originating from untrusted sources.
disclosure
Status do Exploit
EPSS
0.01% (percentil 3%)
CISA SSVC
The primary mitigation is to upgrade to SDL_image version 2.0.6 or later, which contains the fix for this vulnerability. If upgrading is not immediately feasible, consider implementing input validation to restrict the types of image files processed by the application. Specifically, validate the XCF file format and its contents before attempting to decode it. WAFs or proxies can be configured to block requests containing potentially malicious XCF files, although this is a less robust solution. Monitor application logs for unusual memory access patterns or errors related to image decoding, which could indicate exploitation attempts. After upgrading, confirm the fix by attempting to load a known malicious XCF file and verifying that the out-of-bounds read no longer occurs.
Actualice a la versión 2.0.6 o posterior para mitigar el desbordamiento del búfer de la pila. Esta actualización corrige la validación de los índices de la paleta de colores, evitando así el acceso fuera de los límites de la memoria.
Análise de vulnerabilidades e alertas críticos diretamente no seu e-mail.
É uma vulnerabilidade de Buffer Overflow na biblioteca SDL_image, que permite a leitura de dados fora dos limites da memória heap ao processar arquivos .xcf maliciosos. Isso pode levar à exposição de informações sensíveis.
Se você estiver utilizando uma versão da SDL_image anterior ou igual a 996bf12888925932daace576e09c3053410896f8, você pode estar afetado. Verifique a versão da sua biblioteca e atualize para a versão 2.0.6 ou superior.
A correção para essa vulnerabilidade está disponível na versão 2.0.6 da SDL_image. Atualize sua biblioteca para essa versão ou superior para mitigar o risco.
Vetor CVSS
Envie seu arquivo de dependências e descubra na hora se esta e outras CVEs te atingem.