CVE-2025-9300
Severity CVSS v4.0:
MEDIUM
Type:
CWE-119
Buffer Errors
Publication date:
21/08/2025
Last modified:
12/09/2025
Description
A vulnerability was found in saitoha libsixel up to 1.10.3. Affected by this issue is the function sixel_debug_print_palette of the file src/encoder.c of the component img2sixel. The manipulation results in stack-based buffer overflow. The attack must be initiated from a local position. The exploit has been made public and could be used. The patch is identified as 316c086e79d66b62c0c4bc66229ee894e4fdb7d1. Applying a patch is advised to resolve this issue.
Impact
Base Score 4.0
4.80
Severity 4.0
MEDIUM
Base Score 3.x
5.30
Severity 3.x
MEDIUM
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:libsixel_project:libsixel:*:*:*:*:*:*:*:* | 1.10.3 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://drive.google.com/file/d/1IIvvRFgUQZcySqeoqXXhsxd0HZCjClJ7/view?usp=sharing
- https://github.com/saitoha/libsixel/commit/316c086e79d66b62c0c4bc66229ee894e4fdb7d1
- https://github.com/saitoha/libsixel/issues/200
- https://github.com/saitoha/libsixel/issues/200#issuecomment-3178785635
- https://vuldb.com/?ctiid_320905=
- https://vuldb.com/?id_320905=
- https://vuldb.com/?submit_632366=
- https://github.com/saitoha/libsixel/commit/316c086e79d66b62c0c4bc66229ee894e4fdb7d1
- https://github.com/saitoha/libsixel/issues/200
- https://github.com/saitoha/libsixel/issues/200#issuecomment-3178785635
- https://vuldb.com/?submit_632366=



