Libsixel Integer Overflow Leads to Heap Corruption

Libsixel Integer Overflow Leads to Heap Corruption

The National Vulnerability Database (NVD) has disclosed CVE-2026-33020, a high-severity integer overflow vulnerability impacting libsixel, a popular SIXEL encoder/decoder library. According to the NVD, versions 1.8.7 and earlier of libsixel are susceptible to a heap buffer overflow due to flawed arithmetic in the sixel_frame_convert_to_rgb888() function within frame.c. This flaw specifically affects palettized images (PAL1, PAL2, PAL4) where allocation size and pointer offset calculations use int arithmetic before being cast to size_t.

When processing images with a pixel count exceeding INT_MAX / 4, this integer overflow results in an undersized heap allocation for the conversion buffer. Compounding the issue, a negative pointer offset is generated for the normalization sub-buffer. Subsequently, sixel_helper_normalize_pixelformat() attempts to write the full image data starting from this invalid pointer, leading to significant heap corruption. The NVD confirms this behavior through ASAN (AddressSanitizer) findings, indicating a reliable crash and the potential for arbitrary code execution if an attacker provides a specially crafted large palettized PNG image. The issue has been addressed in version 1.8.7-r1.

Related ATT&CK Techniques

🛡️ Detection Rules

7 rules · 5 SIEM formats

7 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, and QRadar AQL.

high T1190 Initial Access

Web Application Exploitation Attempt — CVE-2026-33020

Sigma Splunk SPL Sentinel KQL Elastic QRadar AQL

Get this rule in your SIEM's native format — copy, paste, detect. No manual conversion.

7 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.

Get Detection Rules →

Indicators of Compromise

IDTypeIndicator
CVE-2026-33020 Buffer Overflow libsixel versions 1.8.7 and prior
CVE-2026-33020 Memory Corruption Heap buffer overflow in sixel_frame_convert_to_rgb888() in frame.c
CVE-2026-33020 RCE Specially crafted large palettised PNG leading to heap corruption

Related Posts

Critical RCE Flaw Hits NuGet Gallery Backend

CVE-2026-39399 — NuGet Gallery is a package repository that powers nuget.org. A security vulnerability exists in the NuGetGallery backend job’s handling of .nuspec files within...

vulnerabilityCVEcriticalhigh-severityremote-code-executioncwe-20cwe-22
/CRITICAL /⚑ 4 IOCs

BoidCMS LFI to RCE: A Critical Template Flaw

CVE-2026-39387 — BoidCMS is an open-source, PHP-based flat-file CMS for building simple websites and blogs, using JSON as its database. Versions prior to 2.1.3 are...

vulnerabilityCVEhigh-severityremote-code-executioncwe-98
/HIGH /⚑ 4 IOCs

Nanobot AI: WebSocket Hijack Puts WhatsApp Sessions at Risk

CVE-2026-35589 — nanobot is a personal AI assistant. Versions prior to 0.1.5 contain a Cross-Site WebSocket Hijacking (CSWSH) vulnerability exists in the bridge's WebSocket server...

vulnerabilityCVEhigh-severitycwe-1385
/HIGH /⚑ 5 IOCs