CVE-2020-28591

Source
https://cve.org/CVERecord?id=CVE-2020-28591
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-28591.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2020-28591
Downstream
Related
Published
2021-03-03T18:15:13.673Z
Modified
2026-02-15T00:44:03.448158Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

An out-of-bounds read vulnerability exists in the AMF File AMFParserContext::endElement() functionality of Slic3r libslic3r 1.3.0 and Master Commit 92abbc42. A specially crafted AMF file can lead to information disclosure. An attacker can provide a malicious file to trigger this vulnerability.

References

Affected packages

Git / gitlab.gnome.org/GNOME/glib

Affected ranges

Type
GIT
Repo
https://gitlab.gnome.org/GNOME/glib
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

Other
FOR_GNOME_0_99_1
GLIB_1_1_0
GLIB_1_1_1
GLIB_1_1_10
GLIB_1_1_11
GLIB_1_1_12
GLIB_1_1_13
GLIB_1_1_14
GLIB_1_1_15
GLIB_1_1_16
GLIB_1_1_2
GLIB_1_1_3
GLIB_1_1_3a
GLIB_1_1_4
GLIB_1_1_5
GLIB_1_1_6
GLIB_1_1_7
GLIB_1_1_8
GLIB_1_1_8a
GLIB_1_1_9
GLIB_1_2_0
GLIB_1_3_0
GLIB_GNOME_0_99_1
GLIB_VERSION_1_1_3
PRE_CLEANUP

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-28591.json"