A specially crafted PCX image processed via the application can lead to an out-of-bounds write, overwriting arbitrary data. An attacker can deliver a PCX image to trigger this vulnerability and gain code execution.
https://talosintelligence.com/vulnerability_reports/TALOS-2018-0564