๐Ÿ” CVE Alert

CVE-2026-33020

HIGH 7.1

libsixel: Integer Overflow in write_png_to_file() leads to Heap-based Buffer Overflow

CVSS Score
7.1
EPSS Score
0.0%
EPSS Percentile
3th

libsixel is a SIXEL encoder/decoder implementation derived from kmiya's sixel. Versions 1.8.7 and prior contain an integer overflow which leads to a heap buffer overflow via sixel_frame_convert_to_rgb888() in frame.c, where allocation size and pointer offset computations for palettised images (PAL1, PAL2, PAL4) are performed using int arithmetic before casting to size_t. For images whose pixel count exceeds INT_MAX / 4, the overflow produces an undersized heap allocation for the conversion buffer and a negative pointer offset for the normalization sub-buffer, after which sixel_helper_normalize_pixelformat() writes the full image data starting from the invalid pointer, causing massive heap corruption confirmed by ASAN. An attacker providing a specially crafted large palettised PNG can corrupt the heap of the victim process, resulting in a reliable crash and potential arbitrary code execution. This issue has been fixed in version 1.8.7-r1.

CWE CWE-122 CWE-190
Vendor saitoha
Product libsixel
Published Apr 14, 2026
Last Updated Apr 15, 2026
Stay Ahead of the Next One

Get instant alerts for saitoha libsixel

Be the first to know when new high vulnerabilities affecting saitoha libsixel are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
High

Affected Versions

saitoha / libsixel
< 1.8.7-r1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/saitoha/libsixel/security/advisories/GHSA-2xgm-4x47-2x2p github.com: https://github.com/saitoha/libsixel/releases/tag/v1.8.7-r1