Impact
A bug in libsixel's img2sixel command causes an integer overflow when processing the --crop option. Positive coordinates up to INT_MAX are accepted without safe bounds checks, leading to a negative width calculation that skips the bounds guard. The resulting out‑of‑bounds read occurs during a memmove, causing a crash and exposing data from the heap. The flaw can disclose sensitive information present in the process memory. This is a classic out‑of‑bounds read (CWE‑125) exacerbated by an integer overflow (CWE‑190).
Affected Systems
The vulnerability affects the libsixel library version 1.8.7 and earlier distributed by saitoha. Any system that runs the img2sixel tool with the --crop parameter and provides a crafted coordinate can be impacted.
Risk and Exploitability
The CVSS base score is 7.1, indicating high severity. EPSS data is not available and the vulnerability is not listed in the CISA KEV catalog. An attacker would need to supply a specially crafted crop argument, which is typically a local user or a process that controls input to img2sixel. Based on the description, the attack vector is inferred to be local; there is no evidence of remote exploitation via network interfaces. The vulnerability is exploitable when input validation is bypassed, making it a reliable crash with the potential to leak memory contents.
OpenCVE Enrichment