CVE-2025-53085
BaseFortify
Publication date: 2025-08-25
Last updated on: 2025-11-03
Assigner: Talos
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| sail | sail | 0.9.8 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-122 | A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc(). |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a memory corruption issue in the PSD RLE Decoding functionality of the SAIL Image Decoding Library version 0.9.8. Specifically, when decompressing image data from a specially crafted .psd file, a heap-based buffer overflow can occur. This overflow can allow an attacker to execute remote code by exploiting the library to read a malicious file.
How can this vulnerability impact me? :
The vulnerability can lead to remote code execution on the affected system, which means an attacker could potentially take control of the system, execute arbitrary code, and cause significant harm such as data theft, system compromise, or disruption of services.