Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Sun, 10 May 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Heap‑Based Out‑of‑Bounds Read in OCCT OBJ Parser Leading to DoS or Information Leak |
Sun, 10 May 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-122 |
Sat, 02 May 2026 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Heap‑Based Out‑of‑Bounds Read in OCCT OBJ Parser Leading to DoS or Information Leak |
Fri, 01 May 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
ssvc
|
Fri, 01 May 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Opencascade
Opencascade open Cascade Technology |
|
| Weaknesses | CWE-125 | |
| CPEs | cpe:2.3:a:opencascade:open_cascade_technology:*:*:*:*:*:*:*:* cpe:2.3:a:opencascade:open_cascade_technology:8.0.0:beta1:*:*:*:*:*:* cpe:2.3:a:opencascade:open_cascade_technology:8.0.0:rc1:*:*:*:*:*:* cpe:2.3:a:opencascade:open_cascade_technology:8.0.0:rc2:*:*:*:*:*:* cpe:2.3:a:opencascade:open_cascade_technology:8.0.0:rc3:*:*:*:*:*:* cpe:2.3:a:opencascade:open_cascade_technology:8.0.0:rc4:*:*:*:*:*:* cpe:2.3:a:opencascade:open_cascade_technology:8.0.0:rc5:*:*:*:*:*:* |
|
| Vendors & Products |
Opencascade
Opencascade open Cascade Technology |
|
| Metrics |
cvssV3_1
|
Fri, 01 May 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A heap-based out-of-bounds read vulnerability in RWObj_Reader::read in the OBJ file parser in Open CASCADE Technology (OCCT) V8_0_0_rc5 allows user-assisted attackers to cause a denial of service or obtain sensitive information by persuading a victim to open a crafted OBJ file. The issue occurs because Standard_ReadLineBuffer::ReadLine() can return a 1-byte buffer for a minimal OBJ line, and RWObj_Reader::read() calls pushIndices(aLine + 2) without validating the buffer length. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-05-10T13:22:18.770Z
Reserved: 2026-04-27T00:00:00.000Z
Link: CVE-2026-42477
Updated: 2026-05-01T18:32:03.540Z
Status : Modified
Published: 2026-05-01T15:16:43.737
Modified: 2026-05-10T14:16:50.350
Link: CVE-2026-42477
No data.
OpenCVE Enrichment
Updated: 2026-05-10T16:00:13Z