ghsa-v5hv-4pw3-q6h9
Vulnerability from github
Published
2023-04-03 18:32
Modified
2024-11-22 20:14
Severity ?
Summary
ADMesh improper array index validation
Details
An improper array index validation vulnerability exists in the stl_fix_normal_directions functionality of ADMesh Master Commit 767a105 and v0.98.4. A specially-crafted stl file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.
{ "affected": [ { "package": { "ecosystem": "PyPI", "name": "admesh" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "0.98.5" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2022-38072" ], "database_specific": { "cwe_ids": [ "CWE-118", "CWE-129" ], "github_reviewed": true, "github_reviewed_at": "2024-11-22T20:14:37Z", "nvd_published_at": "2023-04-03T16:15:00Z", "severity": "HIGH" }, "details": "An improper array index validation vulnerability exists in the stl_fix_normal_directions functionality of ADMesh Master Commit 767a105 and v0.98.4. A specially-crafted stl file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.", "id": "GHSA-v5hv-4pw3-q6h9", "modified": "2024-11-22T20:14:38Z", "published": "2023-04-03T18:32:07Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38072" }, { "type": "WEB", "url": "https://github.com/admesh/admesh/commit/5fab257268a0ee6f832c18d72af89810a29fbd5f" }, { "type": "PACKAGE", "url": "https://github.com/admesh/python-admesh" }, { "type": "WEB", "url": "https://github.com/pypa/advisory-database/tree/main/vulns/admesh/PYSEC-2023-263.yaml" }, { "type": "WEB", "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1594" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ], "summary": "ADMesh improper array index validation" }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.