Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-53085

Опубликовано: 25 авг. 2025
Источник: debian
EPSS Низкий

Описание

A memory corruption vulnerability exists in the PSD RLE Decoding functionality of the SAIL Image Decoding Library v0.9.8. When decompressing the image data from a specially crafted .psd file, a heap-based buffer overflow can occur which allows for remote code execution. An attacker will need to convince the library to read a file to trigger this vulnerability.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
sailfixed0.9.9-1package
sailfixed0.9.8-1+deb13u1trixiepackage

Примечания

  • https://talosintelligence.com/vulnerability_reports/TALOS-2025-2219

  • https://github.com/HappySeaFox/sail/issues/227

  • Tests: https://github.com/HappySeaFox/sail/commit/463a80236406a52f59e34f9a4ff0327a3995862b

EPSS

Процентиль: 41%
0.00191
Низкий

Связанные уязвимости

CVSS3: 8.8
ubuntu
6 месяцев назад

A memory corruption vulnerability exists in the PSD RLE Decoding functionality of the SAIL Image Decoding Library v0.9.8. When decompressing the image data from a specially crafted .psd file, a heap-based buffer overflow can occur which allows for remote code execution. An attacker will need to convince the library to read a file to trigger this vulnerability.

CVSS3: 8.8
nvd
6 месяцев назад

A memory corruption vulnerability exists in the PSD RLE Decoding functionality of the SAIL Image Decoding Library v0.9.8. When decompressing the image data from a specially crafted .psd file, a heap-based buffer overflow can occur which allows for remote code execution. An attacker will need to convince the library to read a file to trigger this vulnerability.

CVSS3: 8.8
github
6 месяцев назад

A memory corruption vulnerability exists in the PSD RLE Decoding functionality of the SAIL Image Decoding Library v0.9.8. When decompressing the image data from a specially crafted .psd file, a heap-based buffer overflow can occur which allows for remote code execution. An attacker will need to convince the library to read a file to trigger this vulnerability.

EPSS

Процентиль: 41%
0.00191
Низкий