Multiple stack-based buffer overflow vulnerabilities exist in the readOFF.cpp functionality of libigl v2.4.0. A specially-crafted .off file can lead to a buffer overflow. An attacker can arbitrary code execution to trigger these vulnerabilities.This vulnerability exists within the code responsible for parsing comments within the geometric faces section within an OFF file.
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sun, 13 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Sat, 12 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Wed, 12 Feb 2025 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Libigl
Libigl libigl |
|
Weaknesses | CWE-787 | |
CPEs | cpe:2.3:a:libigl:libigl:2.4.0:*:*:*:*:*:*:* cpe:2.3:a:libigl:libigl:2.5.0:*:*:*:*:*:*:* |
|
Vendors & Products |
Libigl
Libigl libigl |

Status: PUBLISHED
Assigner: talos
Published:
Updated: 2025-02-13T16:56:00.614Z
Reserved: 2023-06-20T15:55:44.327Z
Link: CVE-2023-35952

Updated: 2024-08-02T16:37:40.061Z

Status : Analyzed
Published: 2024-05-28T14:15:09.313
Modified: 2025-02-12T16:10:13.873
Link: CVE-2023-35952

No data.

No data.