First published: Thu Apr 20 2023(Updated: )
A heap-based buffer overflow vulnerability exists in the TriangleMesh clone functionality of Slic3r libslic3r 1.3.0 and Master Commit b1a5500. A specially-crafted STL file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Slic3r libslic3r | =1.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this vulnerability is CVE-2022-36788.
The severity of CVE-2022-36788 is high.
The affected software of CVE-2022-36788 is Slic3r libslic3r 1.3.0.
An attacker can provide a specially-crafted STL file to trigger a heap buffer overflow in Slic3r libslic3r 1.3.0.
Yes, you can find more information about CVE-2022-36788 at https://talosintelligence.com/vulnerability_reports/TALOS-2022-1593.