CVE-2022-36788

A heap-based buffer overflow vulnerability exists in the TriangleMesh clone functionality of Slic3r libslic3r 1.3.0 and Master Commit b1a5500. A specially-crafted STL file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:slic3r:libslic3r:1.3.0:*:*:*:*:*:*:*

History

21 Nov 2024, 07:13

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 7.8
v2 : unknown
v3 : 8.1
References
  • () https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1593 -
References () https://talosintelligence.com/vulnerability_reports/TALOS-2022-1593 - Exploit, Third Party Advisory () https://talosintelligence.com/vulnerability_reports/TALOS-2022-1593 - Exploit, Third Party Advisory

Information

Published : 2023-04-20 16:15

Updated : 2024-11-21 07:13


NVD link : CVE-2022-36788

Mitre link : CVE-2022-36788

CVE.ORG link : CVE-2022-36788


JSON object : View

Products Affected

slic3r

  • libslic3r
CWE
CWE-130

Improper Handling of Length Parameter Inconsistency

CWE-787

Out-of-bounds Write