A heap-based buffer overflow vulnerability exists in the TriangleMesh clone functionality of Slic3r libslic3r 1.3.0 and Master Commit b1a5500. A specially-crafted STL file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.
The product parses a formatted message or structure, but it does not handle or incorrectly handles a length field that is inconsistent with the actual length of the associated data.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Libslic3r | Slic3r | 1.3.0 (including) | 1.3.0 (including) |
Slic3r | Ubuntu | bionic | * |
Slic3r | Ubuntu | kinetic | * |
Slic3r | Ubuntu | lunar | * |
Slic3r | Ubuntu | mantic | * |
Slic3r | Ubuntu | trusty | * |
Slic3r | Ubuntu | xenial | * |