icon

We found results for “

CVE-2024-24684

Date: May 28, 2024

Multiple stack-based buffer overflow vulnerabilities exist in the readOFF functionality of libigl v2.5.0. A specially crafted .off file can lead to stack-based buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability concerns the header parsing occuring while processing an ".off" file via the "readOFF" function. We can see above that at [0] a stack-based buffer called "comment" is defined with an hardcoded size of "1000 bytes". The call to "fscanf" at [1] is unsafe and if the first line of the header of the ".off" files is longer than 1000 bytes it will overflow the "header" buffer.

Language: C++

Severity Score

Severity Score

Weakness Type (CWE)

Out-of-bounds Write

CWE-787

Stack-based Buffer Overflow

CWE-121

CVSS v3.1

Base Score:
Attack Vector (AV): LOCAL
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): REQUIRED
Scope (S): UNCHANGED
Confidentiality (C): HIGH
Integrity (I): HIGH
Availability (A): HIGH

Do you need more information?

Contact Us