| Titre | Debian admesh <=0.98.5 Heap-based Buffer Overflow |
|---|
| Description | A heap-based buffer overflow vulnerability exists in the stl_check_normal_vector function in src/normals.c at line 208. The function uses the facet_num parameter as an array index to access stl->facet_start[facet_num] without validating that facet_num is within the valid range (0 to number_of_facets-1). When processing a malformed STL file that triggers the normal fixing process with an invalid facet index, this causes a buffer overflow when reading the facet data. |
|---|
| La source | ⚠️ https://github.com/admesh/admesh/issues/65 |
|---|
| Utilisateur | LionTree (UID 95208) |
|---|
| Soumission | 05/02/2026 03:59 (il y a 3 mois) |
|---|
| Modérer | 18/02/2026 07:30 (13 days later) |
|---|
| Statut | Accepté |
|---|
| Entrée VulDB | 346450 [admesh jusqu’à 0.98.5 src/normals.c stl_check_normal_vector buffer overflow] |
|---|
| Points | 20 |
|---|