Description
A security flaw has been discovered in admesh up to 0.98.5. This issue affects the function stl_check_normal_vector of the file src/normals.c. Performing a manipulation results in heap-based buffer overflow. The attack must be initiated from a local position. The exploit has been released to the public and may be used for attacks. It looks like this product is not really maintained anymore.
Problem types
Timeline
| 2026-02-18: | Advisory disclosed |
| 2026-02-18: | VulDB entry created |
| 2026-02-21: | VulDB entry last update |
Credits
LionTree (VulDB User)
References
vuldb.com/?id.346450 (VDB-346450 | admesh normals.c stl_check_normal_vector heap-based overflow)
vuldb.com/?ctiid.346450 (VDB-346450 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/?submit.752596 (Submit #752596 | Debian admesh <=0.98.5 Heap-based Buffer Overflow)
github.com/admesh/admesh/issues/65
github.com/admesh/admesh/issues/65
github.com/...50.time.910126.execs.241742.op.havoc.rep.5.zip
github.com/admesh/admesh/