| Severity |
|
| Remote |
|
| Type |
| - |
Unknown |
| + |
Arbitrary code execution |
|
| Description |
| + |
A stack-based buffer overflow vulnerability exists in the import_stl.cc:import_stl() functionality of Openscad openscad-2020.12-RC2. A specially crafted STL file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability. |
|
| References |
| + |
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1223 |
| + |
https://github.com/openscad/openscad/pull/3611 |
| + |
https://github.com/openscad/openscad/commit/07ea60f82e94a155f4926f17fad8e8366bc74874 |
|
| Notes |
|