CVE-2023-35949

Multiple stack-based buffer overflow vulnerabilities exist in the readOFF.cpp functionality of libigl v2.4.0. A specially-crafted .off file can lead to a buffer overflow. An attacker can arbitrary code execution to trigger these vulnerabilities.This vulnerability exists within the code responsible for parsing geometric faces of an OFF file.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:libigl:libigl:2.4.0:*:*:*:*:*:*:*
cpe:2.3:a:libigl:libigl:2.5.0:*:*:*:*:*:*:*

History

12 Feb 2025, 16:10

Type Values Removed Values Added
CWE CWE-787
CPE cpe:2.3:a:libigl:libigl:2.5.0:*:*:*:*:*:*:*
cpe:2.3:a:libigl:libigl:2.4.0:*:*:*:*:*:*:*
First Time Libigl libigl
Libigl
References () https://talosintelligence.com/vulnerability_reports/TALOS-2023-1784 - () https://talosintelligence.com/vulnerability_reports/TALOS-2023-1784 - Exploit, Mitigation, Third Party Advisory
References () https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1784 - () https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1784 - Exploit, Mitigation, Third Party Advisory

Information

Published : 2024-05-28 14:15

Updated : 2025-02-12 16:10


NVD link : CVE-2023-35949

Mitre link : CVE-2023-35949

CVE.ORG link : CVE-2023-35949


JSON object : View

Products Affected

libigl

  • libigl
CWE
CWE-121

Stack-based Buffer Overflow

CWE-787

Out-of-bounds Write