Multiple stack-based buffer overflow vulnerabilities exist in the readOFF.cpp functionality of libigl v2.4.0. A specially-crafted .off file can lead to a buffer overflow. An attacker can arbitrary code execution to trigger these vulnerabilities.This vulnerability exists within the code responsible for parsing geometric faces of an OFF file.
Metrics
Affected Vendors & Products
References
History
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 12 Feb 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Libigl
Libigl libigl |
|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:a:libigl:libigl:2.4.0:*:*:*:*:*:*:* cpe:2.3:a:libigl:libigl:2.5.0:*:*:*:*:*:*:* |
|
| Vendors & Products |
Libigl
Libigl libigl |
Status: PUBLISHED
Assigner: talos
Published: 2024-05-28T14:02:43.211Z
Updated: 2025-02-13T16:55:58.814Z
Reserved: 2023-06-20T15:55:44.327Z
Link: CVE-2023-35949
Updated: 2024-08-02T16:37:40.472Z
Status : Analyzed
Published: 2024-05-28T14:15:08.420
Modified: 2025-02-12T16:10:50.810
Link: CVE-2023-35949
No data.
ReportizFlow