CVE-2022-36788Improper Handling of Length Parameter Inconsistency in Libslic3r

Severity
7.8HIGHNVD
EPSS
0.1%
top 65.06%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 20

Description

A heap-based buffer overflow vulnerability exists in the TriangleMesh clone functionality of Slic3r libslic3r 1.3.0 and Master Commit b1a5500. A specially-crafted STL file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages3 packages

CVEListV5slic3r/libslic3rMaster Commit b1a5500
NVDslic3r/libslic3r1.3.0
debiandebian/slic3r

🔴Vulnerability Details

2
OSV
CVE-2022-36788: A heap-based buffer overflow vulnerability exists in the TriangleMesh clone functionality of Slic3r libslic3r 12023-04-20
GHSA
GHSA-c4jg-97gh-363x: A heap-based buffer overflow vulnerability exists in the TriangleMesh clone functionality of Slic3r libslic3r 12023-04-20

📋Vendor Advisories

1
Debian
CVE-2022-36788: slic3r - A heap-based buffer overflow vulnerability exists in the TriangleMesh clone func...2022