An improper array index validation vulnerability exists in the stl_fix_normal_directions functionality of ADMesh Master Commit 767a105 and v0.98.4. A specially-crafted stl file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.
The product does not restrict or incorrectly restricts operations within the boundaries of a resource that is accessed using an index or pointer, such as memory or files.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Admesh | Admesh_project | 0.98.4 (including) | 0.98.4 (including) |
Admesh | Admesh_project | 2022-11-18 (including) | 2022-11-18 (including) |
Admesh | Ubuntu | bionic | * |
Admesh | Ubuntu | esm-apps/bionic | * |
Admesh | Ubuntu | esm-apps/focal | * |
Admesh | Ubuntu | esm-apps/jammy | * |
Admesh | Ubuntu | esm-apps/xenial | * |
Admesh | Ubuntu | focal | * |
Admesh | Ubuntu | jammy | * |
Admesh | Ubuntu | kinetic | * |
Admesh | Ubuntu | lunar | * |
Admesh | Ubuntu | mantic | * |
Admesh | Ubuntu | trusty | * |
Admesh | Ubuntu | xenial | * |