
We found results for “”
CVE-2024-24684
Date: May 28, 2024
Multiple stack-based buffer overflow vulnerabilities exist in the readOFF functionality of libigl v2.5.0. A specially crafted .off file can lead to stack-based buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability concerns the header parsing occuring while processing an ".off" file via the "readOFF" function. We can see above that at [0] a stack-based buffer called "comment" is defined with an hardcoded size of "1000 bytes". The call to "fscanf" at [1] is unsafe and if the first line of the header of the ".off" files is longer than 1000 bytes it will overflow the "header" buffer.
Language: C++
Severity Score
Related Resources (5)
Severity Score
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | LOCAL |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | NONE |
User Interaction (UI): | REQUIRED |
Scope (S): | UNCHANGED |
Confidentiality (C): | HIGH |
Integrity (I): | HIGH |
Availability (A): | HIGH |