Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Sat, 02 May 2026 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Heap OOB Read in Open CASCADE STL ASCII Parser Causes DoS and Info Disclosure |
Fri, 01 May 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
ssvc
|
Fri, 01 May 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Opencascade
Opencascade open Cascade Technology |
|
| Weaknesses | CWE-125 | |
| CPEs | cpe:2.3:a:opencascade:open_cascade_technology:*:*:*:*:*:*:*:* cpe:2.3:a:opencascade:open_cascade_technology:8.0.0:beta1:*:*:*:*:*:* cpe:2.3:a:opencascade:open_cascade_technology:8.0.0:rc1:*:*:*:*:*:* cpe:2.3:a:opencascade:open_cascade_technology:8.0.0:rc2:*:*:*:*:*:* cpe:2.3:a:opencascade:open_cascade_technology:8.0.0:rc3:*:*:*:*:*:* cpe:2.3:a:opencascade:open_cascade_technology:8.0.0:rc4:*:*:*:*:*:* cpe:2.3:a:opencascade:open_cascade_technology:8.0.0:rc5:*:*:*:*:*:* |
|
| Vendors & Products |
Opencascade
Opencascade open Cascade Technology |
|
| Metrics |
cvssV3_1
|
Fri, 01 May 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Two heap-based out-of-bounds read vulnerabilities in the STL ASCII file parser in Open CASCADE Technology (OCCT) V8_0_0_rc5 exist in RWStl_Reader::ReadAscii because buffers returned by Standard_ReadLineBuffer::ReadLine() are not properly length-validated before strncasecmp or direct byte access. User-assisted attackers can trigger these issues by persuading a victim to open a crafted STL file with extremely short lines, resulting in a denial of service or possible information disclosure. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-05-01T18:32:41.481Z
Reserved: 2026-04-27T00:00:00.000Z
Link: CVE-2026-42476
Updated: 2026-05-01T18:32:32.354Z
Status : Modified
Published: 2026-05-01T15:16:43.620
Modified: 2026-05-01T19:16:31.773
Link: CVE-2026-42476
No data.
OpenCVE Enrichment
Updated: 2026-05-04T19:44:59Z