An out-of-bounds read vulnerability exists in the GCode::extrude() functionality of Slic3r libslic3r 1.3.0 and Master Commit b1a5500. A specially crafted stl file could lead to information disclosure. An attacker can provide a malicious file to trigger this vulnerability.
References
Link | Resource |
---|---|
https://hackmd.io/KSI1bwGfSyO7T8UCf0HeTw | Exploit Third Party Advisory |
https://slic3r.org | Product Vendor Advisory |
https://hackmd.io/KSI1bwGfSyO7T8UCf0HeTw | Exploit Third Party Advisory |
https://slic3r.org | Product Vendor Advisory |
Configurations
History
21 Nov 2024, 06:31
Type | Values Removed | Values Added |
---|---|---|
References | () https://hackmd.io/KSI1bwGfSyO7T8UCf0HeTw - Exploit, Third Party Advisory | |
References | () https://slic3r.org - Product, Vendor Advisory |
Information
Published : 2022-03-01 02:15
Updated : 2024-11-21 06:31
NVD link : CVE-2021-44962
Mitre link : CVE-2021-44962
CVE.ORG link : CVE-2021-44962
JSON object : View
Products Affected
slic3r
- libslic3r
CWE
CWE-125
Out-of-bounds Read