Description
Multiple stack-based buffer overflow vulnerabilities exist in the readOFF functionality of libigl v2.5.0. A specially crafted .off file can lead to stack-based buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability concerns the header parsing occuring while processing an `.off` file via the `readOFF` function. We can see above that at [0] a stack-based buffer called `comment` is defined with an hardcoded size of `1000 bytes`. The call to `fscanf` at [1] is unsafe and if the first line of the header of the `.off` files is longer than 1000 bytes it will overflow the `header` buffer.
INFO
Published Date :
2024-05-28T14:02:39.939Z
Last Modified :
2025-02-13T17:40:18.620Z
Source :
talos
AFFECTED PRODUCTS
The following products are affected by CVE-2024-24684 vulnerability.
| Vendors | Products |
|---|---|
| Libigl |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2024-24684.