An improper array index validation vulnerability exists in the stl_fix_normal_directions functionality of ADMesh Master Commit 767a105 and v0.98.4. A specially-crafted stl file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.
The product does not restrict or incorrectly restricts operations within the boundaries of a resource that is accessed using an index or pointer, such as memory or files.
The product uses untrusted input when calculating or using an array index, but the product does not validate or incorrectly validates the index to ensure the index references a valid position within the array.
Link | Tags |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2022-1594 | third party advisory exploit technical description |
https://github.com/admesh/admesh/commit/5fab257268a0ee6f832c18d72af89810a29fbd5f | patch |
https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1594 |