DNA View

Critical Severity Vulnerability

This vulnerability has been rated as Critical severity. Immediate action is recommended.

CVE-2026-40494

Critical
Low Medium High Critical
9.8
CVSS Score
Published: Apr 18, 2026
Last Modified: Apr 18, 2026

Vulnerability Description

SAIL is a cross-platform library for loading and saving images with support for animation, metadata, and ICC profiles. Prior to commit 45d48d1f2e8e0d73e80bc1fd5310cb57f4547302, the TGA codec's RLE decoder in `tga.c` has an asymmetric bounds check vulnerability. The run-packet path (line 297) correctly clamps the repeat count to the remaining buffer space, but the raw-packet path (line 305-311) has no equivalent bounds check. This allows writing up to 496 bytes of attacker-controlled data past the end of a heap buffer. Commit 45d48d1f2e8e0d73e80bc1fd5310cb57f4547302 patches the issue.

CVSS Metrics

Common Vulnerability Scoring System

Vector String:

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
N
Attack Complexity
L
Privileges Required
N
User Interaction
N
Scope
U
Confidentiality
H
Integrity
H
Availability
H

Severity Details

9.8
out of 10.0
Critical

Weakness Type (CWE)

CWE-787 Top 25 #2

Out-of-bounds Write

Description
The product writes data past the end, or before the beginning, of the intended buffer.
Exploit Likelihood
High
Typical Severity
High
Abstraction Level
Base

Key Information

Published Date
April 18, 2026