CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
54.9%
An improper array index validation vulnerability exists in the stl_fix_normal_directions functionality of ADMesh Master Commit 767a105 and v0.98.4. A specially-crafted stl file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.
Vendor | Product | Version | CPE |
---|---|---|---|
admesh_project | admesh | 0.98.4 | cpe:2.3:a:admesh_project:admesh:0.98.4:*:*:*:*:*:*:* |
admesh_project | admesh | 2022-11-18 | cpe:2.3:a:admesh_project:admesh:2022-11-18:*:*:*:*:*:*:* |
slic3r | libslic3r | b1a5500 | cpe:2.3:a:slic3r:libslic3r:b1a5500:*:*:*:*:*:*:* |
[
{
"vendor": "ADMesh",
"product": "ADMesh",
"versions": [
{
"version": "Master Commit 767a105",
"status": "affected"
},
{
"version": "v0.98.4",
"status": "affected"
}
]
},
{
"vendor": "ADMesh",
"product": "ADMesh",
"versions": [
{
"version": "Master Commit 767a105",
"status": "affected"
},
{
"version": "v0.98.4",
"status": "affected"
}
]
},
{
"vendor": "ADMesh",
"product": "ADMesh",
"versions": [
{
"version": "Master Commit 767a105",
"status": "affected"
},
{
"version": "v0.98.4",
"status": "affected"
}
]
},
{
"vendor": "Slic3r",
"product": "libslic3r",
"versions": [
{
"version": "Master Commit b1a5500",
"status": "affected"
}
]
}
]
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
54.9%