Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2022-36788
HistoryApr 20, 2023 - 4:15 p.m.

CVE-2022-36788

2023-04-2016:15:07
Debian Security Bug Tracker
security-tracker.debian.org
9
cve-2022-36788
trianglemesh clone
slic3r libslic3r
stl file
heap buffer overflow
unix

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

28.9%

A heap-based buffer overflow vulnerability exists in the TriangleMesh clone functionality of Slic3r libslic3r 1.3.0 and Master Commit b1a5500. A specially-crafted STL file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.

OSVersionArchitecturePackageVersionFilename
Debian12allslic3r<= 1.3.0+dfsg1-5slic3r_1.3.0+dfsg1-5_all.deb
Debian11allslic3r<= 1.3.0+dfsg1-5slic3r_1.3.0+dfsg1-5_all.deb
Debian999allslic3r<= 1.3.0+dfsg1-5slic3r_1.3.0+dfsg1-5_all.deb

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

28.9%

Related for DEBIANCVE:CVE-2022-36788