A heap-based buffer overflow vulnerability exists in the TriangleMesh clone functionality of Slic3r libslic3r 1.3.0 and Master Commit b1a5500. A specially-crafted STL file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.
References
Link | Resource |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2022-1593 | Exploit Third Party Advisory |
https://talosintelligence.com/vulnerability_reports/TALOS-2022-1593 | Exploit Third Party Advisory |
https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1593 |
Configurations
History
21 Nov 2024, 07:13
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.1 |
References |
|
|
References | () https://talosintelligence.com/vulnerability_reports/TALOS-2022-1593 - Exploit, Third Party Advisory |
Information
Published : 2023-04-20 16:15
Updated : 2024-11-21 07:13
NVD link : CVE-2022-36788
Mitre link : CVE-2022-36788
CVE.ORG link : CVE-2022-36788
JSON object : View
Products Affected
slic3r
- libslic3r