Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2024-24684

Опубликовано: 28 мая 2024
Источник: nvd
CVSS3: 7.8
EPSS Средний

Описание

Multiple stack-based buffer overflow vulnerabilities exist in the readOFF functionality of libigl v2.5.0. A specially crafted .off file can lead to stack-based buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability concerns the header parsing occuring while processing an .off file via the readOFF function.

We can see above that at [0] a stack-based buffer called comment is defined with an hardcoded size of 1000 bytes. The call to fscanf at [1] is unsafe and if the first line of the header of the .off files is longer than 1000 bytes it will overflow the header buffer.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:libigl:libigl:2.5.0:*:*:*:*:*:*:*

EPSS

Процентиль: 96%
0.21925
Средний

7.8 High

CVSS3

Дефекты

CWE-121
CWE-787

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 1 года назад

Multiple stack-based buffer overflow vulnerabilities exist in the readOFF functionality of libigl v2.5.0. A specially crafted .off file can lead to stack-based buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability concerns the header parsing occuring while processing an `.off` file via the `readOFF` function. We can see above that at [0] a stack-based buffer called `comment` is defined with an hardcoded size of `1000 bytes`. The call to `fscanf` at [1] is unsafe and if the first line of the header of the `.off` files is longer than 1000 bytes it will overflow the `header` buffer.

CVSS3: 7.8
fstec
около 2 лет назад

Уязвимость функции readOFF библиотеки libigl для работы с геометрическими объектами языка программирования С++, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 96%
0.21925
Средний

7.8 High

CVSS3

Дефекты

CWE-121
CWE-787