Lucene search

K
cve[email protected]CVE-2022-38072
HistoryApr 03, 2023 - 4:15 p.m.

CVE-2022-38072

2023-04-0316:15:07
CWE-118
CWE-129
web.nvd.nist.gov
18
admesh
vulnerability
cve-2022-38072
array index validation
heap buffer overflow
security

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.6 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

52.8%

An improper array index validation vulnerability exists in the stl_fix_normal_directions functionality of ADMesh Master Commit 767a105 and v0.98.4. A specially-crafted stl file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.

Affected configurations

Vulners
NVD
Node
admeshadmeshRangeMaster Commit 767a105
OR
admeshadmeshRangev0.98.4
OR
admeshadmeshRangeMaster Commit 767a105
OR
admeshadmeshRangev0.98.4
OR
admeshadmeshRangeMaster Commit 767a105
OR
admeshadmeshRangev0.98.4
OR
slic3rlibslic3rRangeMaster Commit b1a5500
VendorProductVersionCPE
slic3rlibslic3r*cpe:2.3:a:slic3r:libslic3r:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "ADMesh",
    "product": "ADMesh",
    "versions": [
      {
        "version": "Master Commit 767a105",
        "status": "affected"
      },
      {
        "version": "v0.98.4",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "ADMesh",
    "product": "ADMesh",
    "versions": [
      {
        "version": "Master Commit 767a105",
        "status": "affected"
      },
      {
        "version": "v0.98.4",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "ADMesh",
    "product": "ADMesh",
    "versions": [
      {
        "version": "Master Commit 767a105",
        "status": "affected"
      },
      {
        "version": "v0.98.4",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "Slic3r",
    "product": "libslic3r",
    "versions": [
      {
        "version": "Master Commit b1a5500",
        "status": "affected"
      }
    ]
  }
]

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.6 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

52.8%