Multiple stack-based buffer overflow vulnerabilities exist in the readOFF.cpp functionality of libigl v2.4.0. A specially-crafted .off file can lead to a buffer overflow. An attacker can arbitrary code execution to trigger these vulnerabilities.This vulnerability exists within the code responsible for parsing comments within the geometric vertices section within an OFF file.
Metrics
Affected Vendors & Products
References
History
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 12 Feb 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Libigl
Libigl libigl |
|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:a:libigl:libigl:2.4.0:*:*:*:*:*:*:* cpe:2.3:a:libigl:libigl:2.5.0:*:*:*:*:*:*:* |
|
| Vendors & Products |
Libigl
Libigl libigl |
Status: PUBLISHED
Assigner: talos
Published: 2024-05-28T14:02:43.553Z
Updated: 2025-02-13T16:56:01.202Z
Reserved: 2023-06-20T15:55:44.327Z
Link: CVE-2023-35953
Updated: 2024-08-02T16:37:41.168Z
Status : Analyzed
Published: 2024-05-28T14:15:09.540
Modified: 2025-02-12T16:10:01.867
Link: CVE-2023-35953
No data.
ReportizFlow