| Título | Debian admesh <=0.98.5 Heap-based Buffer Overflow |
|---|
| Descripción | A heap-based buffer overflow vulnerability exists in the stl_check_normal_vector function in src/normals.c at line 208. The function uses the facet_num parameter as an array index to access stl->facet_start[facet_num] without validating that facet_num is within the valid range (0 to number_of_facets-1). When processing a malformed STL file that triggers the normal fixing process with an invalid facet index, this causes a buffer overflow when reading the facet data. |
|---|
| Fuente | ⚠️ https://github.com/admesh/admesh/issues/65 |
|---|
| Usuario | LionTree (UID 95208) |
|---|
| Sumisión | 2026-02-05 03:59 (hace 3 meses) |
|---|
| Moderación | 2026-02-18 07:30 (13 days later) |
|---|
| Estado | Aceptado |
|---|
| Entrada de VulDB | 346450 [admesh hasta 0.98.5 src/normals.c stl_check_normal_vector desbordamiento de búfer] |
|---|
| Puntos | 20 |
|---|