We can see above that at [0] a stack-based buffer called `comment` is defined with an hardcoded size of `1000 bytes`. The call to `fscanf` at [1] is unsafe and if the first line of the header of the `.off` files is longer than 1000 bytes it will overflow the `header` buffer.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 12 Feb 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Libigl
Libigl libigl |
|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:a:libigl:libigl:2.5.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Libigl
Libigl libigl |
Status: PUBLISHED
Assigner: talos
Published:
Updated: 2025-02-13T17:40:18.620Z
Reserved: 2024-01-26T09:40:46.280Z
Link: CVE-2024-24684
Updated: 2024-08-01T23:28:11.102Z
Status : Analyzed
Published: 2024-05-28T14:15:11.830
Modified: 2025-02-12T19:29:16.393
Link: CVE-2024-24684
No data.
OpenCVE Enrichment
No data.