An improper array index validation vulnerability exists in the stl_fix_normal_directions functionality of ADMesh Master Commit 767a105 and v0.98.4. A specially-crafted stl file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.
References
Link | Resource |
---|---|
https://github.com/admesh/admesh/commit/5fab257268a0ee6f832c18d72af89810a29fbd5f | Patch |
https://talosintelligence.com/vulnerability_reports/TALOS-2022-1594 | Exploit Technical Description Third Party Advisory |
https://github.com/admesh/admesh/commit/5fab257268a0ee6f832c18d72af89810a29fbd5f | Patch |
https://talosintelligence.com/vulnerability_reports/TALOS-2022-1594 | Exploit Technical Description Third Party Advisory |
https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1594 |
Configurations
History
21 Nov 2024, 07:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
References |
|
|
References | () https://github.com/admesh/admesh/commit/5fab257268a0ee6f832c18d72af89810a29fbd5f - Patch | |
References | () https://talosintelligence.com/vulnerability_reports/TALOS-2022-1594 - Exploit, Technical Description, Third Party Advisory |
Information
Published : 2023-04-03 16:15
Updated : 2024-11-21 07:15
NVD link : CVE-2022-38072
Mitre link : CVE-2022-38072
CVE.ORG link : CVE-2022-38072
JSON object : View
Products Affected
slic3r
- libslic3r
admesh_project
- admesh