CVE-2023-35953

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-35953
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-35953.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-35953
Related
Published
2024-05-28T14:15:09Z
Modified
2025-02-21T01:59:42.565972Z
Summary
[none]
Details

Multiple stack-based buffer overflow vulnerabilities exist in the readOFF.cpp functionality of libigl v2.4.0. A specially-crafted .off file can lead to a buffer overflow. An attacker can arbitrary code execution to trigger these vulnerabilities.This vulnerability exists within the code responsible for parsing comments within the geometric vertices section within an OFF file.

References

Affected packages

Git / github.com/libigl/libigl

Affected ranges

Type
GIT
Repo
https://github.com/libigl/libigl
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Last affected

Affected versions

v1.*

v1.3.1
v1.3.2
v1.3.3

v2.*

v2.0.0
v2.1.0
v2.2.0
v2.3.0
v2.4.0