Severity |
|
Remote |
|
Type |
- |
Unknown |
+ |
Arbitrary code execution |
|
Description |
+ |
A stack-based buffer overflow vulnerability exists in the import_stl.cc:import_stl() functionality of Openscad openscad-2020.12-RC2. A specially crafted STL file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability. |
|
References |
+ |
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1223 |
+ |
https://github.com/openscad/openscad/pull/3611 |
+ |
https://github.com/openscad/openscad/commit/07ea60f82e94a155f4926f17fad8e8366bc74874 |
|
Notes |
|