Multiple stack-based buffer overflow vulnerabilities exist in the readOFF.cpp functionality of libigl v2.4.0. A specially-crafted .off file can lead to a buffer overflow. An attacker can arbitrary code execution to trigger these vulnerabilities.This vulnerability exists within the code responsible for parsing comments within the geometric faces section within an OFF file.
                
            Metrics
Affected Vendors & Products
References
        History
                    Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        
        epss
         
  | 
    
        
        
        epss
         
  | 
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        
        epss
         
  | 
    
        
        
        epss
         
  | 
Wed, 12 Feb 2025 16:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Libigl
         Libigl libigl  | 
|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:a:libigl:libigl:2.4.0:*:*:*:*:*:*:* cpe:2.3:a:libigl:libigl:2.5.0:*:*:*:*:*:*:*  | 
|
| Vendors & Products | 
        
        Libigl
         Libigl libigl  | 
Status: PUBLISHED
Assigner: talos
Published: 2024-05-28T14:02:43.466Z
Updated: 2025-02-13T16:56:00.614Z
Reserved: 2023-06-20T15:55:44.327Z
Link: CVE-2023-35952
Updated: 2024-08-02T16:37:40.061Z
Status : Analyzed
Published: 2024-05-28T14:15:09.313
Modified: 2025-02-12T16:10:13.873
Link: CVE-2023-35952
No data.