Stack-based Buffer Overflow Affecting libigl/libigl package, versions [2.4.0,]
Threat Intelligence
Exploit Maturity
Proof of concept
EPSS
0.06% (26th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-UNMANAGED-LIBIGLLIBIGL-7151940
- published 29 May 2024
- disclosed 28 May 2024
- credit Carl Hurd
Introduced: 28 May 2024
CVE-2023-35952 Open this link in a new tabHow to fix?
There is no fixed version for libigl/libigl
.
Overview
Affected versions of this package are vulnerable to Stack-based Buffer Overflow due to the readOFF.cpp
functionality. An attacker can execute arbitrary code by providing a maliciously crafted .off
file that exploits the buffer overflow condition in the parsing of comments within the geometric faces section.
References
CVSS Scores
version 3.1