CVE-2025-53085

8.8 HIGH

📋 TL;DR

A heap-based buffer overflow vulnerability in the SAIL Image Decoding Library's PSD RLE decoding functionality allows remote code execution when processing malicious .psd files. Any application using SAIL v0.9.8 to handle PSD images is affected. Attackers can achieve arbitrary code execution by convincing users or systems to process specially crafted PSD files.

💻 Affected Systems

Products:
  • SAIL Image Decoding Library
Versions: v0.9.8
Operating Systems: All platforms where SAIL is used (Linux, Windows, macOS, etc.)
Default Config Vulnerable: ⚠️ Yes
Notes: Any application that uses SAIL library to process PSD files is vulnerable. The vulnerability is in the library itself, not specific applications.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining the same privileges as the process using the library, potentially leading to data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Application crash (denial of service) or limited code execution within the context of the vulnerable application, potentially allowing lateral movement or data exfiltration.

🟢

If Mitigated

Application crash with no code execution if memory protections (ASLR, DEP) are effective, but still causing service disruption.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires the target to process a malicious PSD file. No authentication is needed if file processing is automated or user-initiated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v0.9.9 or later

Vendor Advisory: https://github.com/smoked-herring/sail/releases

Restart Required: Yes

Instructions:

1. Check current SAIL version. 2. Update to v0.9.9 or later from official repository. 3. Rebuild any applications using SAIL. 4. Restart affected services.

🔧 Temporary Workarounds

Disable PSD file processing

all

Configure applications to reject or not process PSD files if not required

Input validation for PSD files

all

Implement file type validation and size limits before passing to SAIL library

🧯 If You Can't Patch

  • Implement strict file upload controls to block PSD files at network perimeter
  • Run applications using SAIL with minimal privileges and in sandboxed environments

🔍 How to Verify

Check if Vulnerable:

Check if SAIL v0.9.8 is installed and used by applications. Review application dependencies and library versions.

Check Version:

Check library version in build configuration or run 'strings /path/to/libsail.so | grep sail_version' on Linux systems

Verify Fix Applied:

Verify SAIL version is v0.9.9 or later. Test with known safe PSD files to ensure functionality.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when processing PSD files
  • Memory access violation errors in application logs
  • Unexpected process termination

Network Indicators:

  • Unusual PSD file transfers to systems using SAIL
  • File uploads with PSD extensions to web applications

SIEM Query:

source="application_logs" AND ("segmentation fault" OR "access violation" OR "heap corruption") AND process="*sail*"

🔗 References

📤 Share & Export