An out-of-bounds read vulnerability exists in the GCode::extrude() functionality of Slic3r libslic3r 1.3.0 and Master Commit b1a5500. A specially crafted stl file could lead to information disclosure. An attacker can provide a malicious file to trigger this vulnerability.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://hackmd.io/KSI1bwGfSyO7T8UCf0HeTw | third party advisory exploit |
https://slic3r.org | product vendor advisory |