Lucene search

K
cveTalosCVE-2022-38072
HistoryApr 03, 2023 - 4:15 p.m.

CVE-2022-38072

2023-04-0316:15:07
CWE-129
CWE-118
talos
web.nvd.nist.gov
24
admesh
vulnerability
cve-2022-38072
array index validation
heap buffer overflow
security

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

8.6

Confidence

High

EPSS

0.002

Percentile

54.9%

An improper array index validation vulnerability exists in the stl_fix_normal_directions functionality of ADMesh Master Commit 767a105 and v0.98.4. A specially-crafted stl file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.

Affected configurations

Nvd
Vulners
Node
admesh_projectadmeshMatch0.98.4
OR
admesh_projectadmeshMatch2022-11-18
Node
slic3rlibslic3rMatchb1a5500
VendorProductVersionCPE
admesh_projectadmesh0.98.4cpe:2.3:a:admesh_project:admesh:0.98.4:*:*:*:*:*:*:*
admesh_projectadmesh2022-11-18cpe:2.3:a:admesh_project:admesh:2022-11-18:*:*:*:*:*:*:*
slic3rlibslic3rb1a5500cpe:2.3:a:slic3r:libslic3r:b1a5500:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "ADMesh",
    "product": "ADMesh",
    "versions": [
      {
        "version": "Master Commit 767a105",
        "status": "affected"
      },
      {
        "version": "v0.98.4",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "ADMesh",
    "product": "ADMesh",
    "versions": [
      {
        "version": "Master Commit 767a105",
        "status": "affected"
      },
      {
        "version": "v0.98.4",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "ADMesh",
    "product": "ADMesh",
    "versions": [
      {
        "version": "Master Commit 767a105",
        "status": "affected"
      },
      {
        "version": "v0.98.4",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "Slic3r",
    "product": "libslic3r",
    "versions": [
      {
        "version": "Master Commit b1a5500",
        "status": "affected"
      }
    ]
  }
]

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

8.6

Confidence

High

EPSS

0.002

Percentile

54.9%