Multiple stack-based buffer overflow vulnerabilities exist in the readOFF.cpp functionality of libigl v2.4.0. A specially-crafted .off file can lead to a buffer overflow. An attacker can arbitrary code execution to trigger these vulnerabilities.This vulnerability exists within the code responsible for parsing comments within the geometric vertices section within an OFF file.
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sun, 13 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Sat, 12 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Wed, 12 Feb 2025 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Libigl
Libigl libigl |
|
Weaknesses | CWE-787 | |
CPEs | cpe:2.3:a:libigl:libigl:2.4.0:*:*:*:*:*:*:* cpe:2.3:a:libigl:libigl:2.5.0:*:*:*:*:*:*:* |
|
Vendors & Products |
Libigl
Libigl libigl |

Status: PUBLISHED
Assigner: talos
Published:
Updated: 2025-02-13T16:56:01.202Z
Reserved: 2023-06-20T15:55:44.327Z
Link: CVE-2023-35953

Updated: 2024-08-02T16:37:41.168Z

Status : Analyzed
Published: 2024-05-28T14:15:09.540
Modified: 2025-02-12T16:10:01.867
Link: CVE-2023-35953

No data.

No data.