Bug 1227290 (CVE-2020-28596)

Summary: VUL-0: CVE-2020-28596: PrusaSlicer: stack-based buffer overflow in the Objparser::objparse() functionality
Product: [openSUSE] openSUSE Distribution Reporter: SMASH SMASH <smash_bz>
Component: SecurityAssignee: Benjamin Greiner <code>
Status: NEW --- QA Contact: Security Team bot <security-team>
Severity: Major    
Priority: P3 - Medium CC: camila.matos
Version: Leap 15.6   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/277704/
Whiteboard:
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description SMASH SMASH 2024-07-02 12:16:45 UTC
A stack-based buffer overflow vulnerability exists in the Objparser::objparse()
functionality of Prusa Research PrusaSlicer 2.2.0 and Master (commit 4b040b856).
A specially crafted obj file can lead to code execution. An attacker can provide
a malicious file to trigger this vulnerability.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-28596
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1220
https://www.cve.org/CVERecord?id=CVE-2020-28596
https://bugzilla.redhat.com/show_bug.cgi?id=2294728