CVE-2020-28591Improper Input Validation in Slic3r

Severity
6.5MEDIUMNVD
EPSS
0.3%
top 44.48%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 3
Latest updateMay 24

Description

An out-of-bounds read vulnerability exists in the AMF File AMFParserContext::endElement() functionality of Slic3r libslic3r 1.3.0 and Master Commit 92abbc42. A specially crafted AMF file can lead to information disclosure. An attacker can provide a malicious file to trigger this vulnerability.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:NExploitability: 2.8 | Impact: 3.6

Affected Packages3 packages

NVDslic3r/libslic3r1.3.0
debiandebian/slic3r< slic3r 1.3.0+dfsg1-4 (bookworm)
Debianslic3r/slic3r< 1.3.0+dfsg1-4+1

Also affects: Fedora 32, 33, 34

🔴Vulnerability Details

2
GHSA
GHSA-jx3c-cqwp-ww97: An out-of-bounds read vulnerability exists in the AMF File AMFParserContext::endElement() functionality of Slic3r libslic3r 12022-05-24
OSV
CVE-2020-28591: An out-of-bounds read vulnerability exists in the AMF File AMFParserContext::endElement() functionality of Slic3r libslic3r 12021-03-03

📋Vendor Advisories

1
Debian
CVE-2020-28591: slic3r - An out-of-bounds read vulnerability exists in the AMF File AMFParserContext::end...2020