Vulnerability Details : CVE-2022-0496
A vulnerbiility was found in Openscad, where a DXF-format drawing with particular (not necessarily malformed!) properties may cause an out-of-bounds memory access when imported using import().
Vulnerability category: Overflow
Exploit prediction scoring system (EPSS) score for CVE-2022-0496
Probability of exploitation activity in the next 30 days: 0.05%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 19 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2022-0496
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N |
1.8
|
3.6
|
nvd@nist.gov |
CWE ids for CVE-2022-0496
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: secalert@redhat.com (Secondary)
-
The product reads data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-0496
-
https://bugzilla.redhat.com/show_bug.cgi?id=2050695
2050695 – (CVE-2022-0496) CVE-2022-0496 openscad: Out-of-bounds memory access in DXF loaderIssue Tracking;Third Party Advisory
-
https://github.com/openscad/openscad/commit/770e3234cbfe66edbc0333f796b46d36a74aa652
add safety to line lookups in DXF import, fixes #4037 · openscad/openscad@770e323 · GitHubPatch;Third Party Advisory
-
https://github.com/openscad/openscad/issues/4037
Out-of-bounds memory access in DXF loader (path identification) · Issue #4037 · openscad/openscad · GitHubExploit;Issue Tracking;Patch;Third Party Advisory
-
https://github.com/openscad/openscad/commit/00a4692989c4e2f191525f73f24ad8727bacdf41
CVE-2022-0496 Out-of-bounds memory access in DXF loader. · openscad/openscad@00a4692 · GitHubPatch;Third Party Advisory
Products affected by CVE-2022-0496
- cpe:2.3:a:openscad:openscad:*:*:*:*:*:*:*:*