-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Detect Malicious STL files #10
Comments
Here's an example real-world file change (taken from the PR mentioned in the OP)
The good news is that the
|
I created this question on SE to see if there's already a tool available to scan or sanitize |
I opened a feature request for Dangerzone to support |
I read the TALOS-2022-1594 report published in April 2023 that describes the heap buffer overflow vulnerability in ADMesh v0.98.4 due to a maliciously-crafted I'm curious if this issue can only be caused by binary files, so maybe it's sufficiently mitigated by only accepting plaintext Or maybe the maliciously-crafted I asked Talos and the ADMesh dev to please publish the maliciously-crafted |
See https://doi.org/10.1145/3471621.3471843 Edit: they mention a follow up paper and I found it but its not free: https://doi.org/10.1145/3626232.3653276 |
Interesting. Quick review of the linked file above describes methods of using Anyway, the relevant bit that I see is their
|
@goldfishlaser I think an STL sanitizer would make a great tool to present at DEF CON :P |
I don't disagree. Their paper was pretty entertaining. |
I plan to get my next free ticket by becoming a goon though :P |
I still don't think banning/fearing STLs is the move though.
…On Thu, Aug 29, 2024, 18:25 Michael Altfield ***@***.***> wrote:
@goldfishlaser <https://github.com/goldfishlaser> I think an STL
sanitizer would make a great tool to present at DEF CON :P
—
Reply to this email directly, view it on GitHub
<#10 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AAER7EBRG765RRL5IJSHY4DZT6NVPAVCNFSM6AAAAABLNGH6HOVHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMZDGMJZGE2TSNZRGQ>
.
You are receiving this because you were mentioned.Message ID:
***@***.***>
|
This issue will track the effort to implement some mechanism to scan (or sanitize)
.stl
files committed in PRsProblem
Today @goldfishlaser and I realized that we don't have a system in-place to be able to scan and/or sanitize
.stl
changes committed by contributors. For example, this simple PR resulted in a change to an.stl
file with 39,614 additions and 39,726 deletionsThe concern is not unfounded: there has been at least one historically-known vulnerability where a maliciously-crafted
.stl
file could be used to trigger a heap buffer overflow. This was identified as a HIGH severity (8.8/10) bug by NIST in CVE-2022-38072Solution
We need either:
.stl
files, or.stl
files (eg something like qvm-convert or Dangerzone), or.stl
files into this repo (perhaps we can use a CI process to generate them from the source.scad
files?)The text was updated successfully, but these errors were encountered: