Stack-based Buffer Overflow Affecting libigl/libigl package, versions [2.5.0,]
Threat Intelligence
Exploit Maturity
Proof of concept
EPSS
0.06% (26th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-UNMANAGED-LIBIGLLIBIGL-7151919
- published 29 May 2024
- disclosed 28 May 2024
- credit Philippe Laulheret
Introduced: 28 May 2024
CVE-2024-24686 Open this link in a new tabHow to fix?
There is no fixed version for libigl/libigl
.
Overview
Affected versions of this package are vulnerable to Stack-based Buffer Overflow through the readOFF
function. An attacker can execute arbitrary code or cause a crash by providing a malicious .off
file that exploits improper handling of input data during the parsing of comments within the faces section.
References
CVSS Scores
version 3.1