A vulnerability was found in saitoha libsixel up to 1.10.3. Affected by this issue is the function sixel_debug_print_palette of the file src/encoder.c of the component img2sixel. The manipulation results in stack-based buffer overflow. The attack must be initiated from a local position. The exploit has been made public and could be used. The patch is identified as 316c086e79d66b62c0c4bc66229ee894e4fdb7d1. Applying a patch is advised to resolve this issue.
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
Link | Tags |
---|---|
https://vuldb.com/?id.320905 | vdb entry technical description |
https://vuldb.com/?ctiid.320905 | permissions required signature |
https://vuldb.com/?submit.632366 | third party advisory |
https://github.com/saitoha/libsixel/issues/200 | issue tracking |
https://github.com/saitoha/libsixel/issues/200#issuecomment-3178785635 | issue tracking |
https://drive.google.com/file/d/1IIvvRFgUQZcySqeoqXXhsxd0HZCjClJ7/view?usp=sharing | exploit |
https://github.com/saitoha/libsixel/commit/316c086e79d66b62c0c4bc66229ee894e4fdb7d1 | patch |