2 results (0.004 seconds)

CVSS: 8.8EPSS: 0%CPEs: 3EXPL: 1

An improper array index validation vulnerability exists in the stl_fix_normal_directions functionality of ADMesh Master Commit 767a105 and v0.98.4. A specially-crafted stl file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability. • https://github.com/admesh/admesh/commit/5fab257268a0ee6f832c18d72af89810a29fbd5f https://talosintelligence.com/vulnerability_reports/TALOS-2022-1594 • CWE-118: Incorrect Access of Indexable Resource ('Range Error') CWE-129: Improper Validation of Array Index •

CVSS: 8.1EPSS: 0%CPEs: 2EXPL: 1

ADMesh through 0.98.4 has a heap-based buffer over-read in stl_update_connects_remove_1 (called from stl_remove_degenerate) in connect.c in libadmesh.a. ADMesh versiones hasta 0.98.4, presenta una lectura excesiva de búfer en la región heap de la memoria en stl_update_connects_remove_1 (llamado desde stl_remove_degenerate) en el archivo connect.c en libadmesh.a • https://github.com/admesh/admesh/issues/28 https://lists.debian.org/debian-lts-announce/2022/05/msg00029.html • CWE-125: Out-of-bounds Read •