Description
Multiple stack-based buffer overflow vulnerabilities exist in the readOFF functionality of libigl v2.5.0. A specially crafted .off file can lead to stack-based buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability concerns the header parsing occuring while processing an `.off` file via the `readOFF` function.


We can see above that at [0] a stack-based buffer called `comment` is defined with an hardcoded size of `1000 bytes`. The call to `fscanf` at [1] is unsafe and if the first line of the header of the `.off` files is longer than 1000 bytes it will overflow the `header` buffer.
Published: 2024-05-28
Score: 7.8 High
EPSS: 21.9% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sun, 13 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.16142}

epss

{'score': 0.17379}


Wed, 12 Feb 2025 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Libigl
Libigl libigl
Weaknesses CWE-787
CPEs cpe:2.3:a:libigl:libigl:2.5.0:*:*:*:*:*:*:*
Vendors & Products Libigl
Libigl libigl

cve-icon MITRE

Status: PUBLISHED

Assigner: talos

Published:

Updated: 2025-02-13T17:40:18.620Z

Reserved: 2024-01-26T09:40:46.280Z

Link: CVE-2024-24684

cve-icon Vulnrichment

Updated: 2024-08-01T23:28:11.102Z

cve-icon NVD

Status : Analyzed

Published: 2024-05-28T14:15:11.830

Modified: 2025-02-12T19:29:16.393

Link: CVE-2024-24684

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses