Bug 2283911 (CVE-2023-35952) - CVE-2023-35952 meshlab: stack-based buffer overflow vulnerabilities exist in the readOFF.cpp
Summary: CVE-2023-35952 meshlab: stack-based buffer overflow vulnerabilities exist in ...
Keywords:
Status: NEW
Alias: CVE-2023-35952
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2283913
Blocks:
TreeView+ depends on / blocked
 
Reported: 2024-05-30 08:09 UTC by Rohit Keshri
Modified: 2024-05-30 08:09 UTC (History)
0 users

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description Rohit Keshri 2024-05-30 08:09:12 UTC
Multiple stack-based buffer overflow vulnerabilities exist in the readOFF.cpp functionality of libigl v2.4.0. A specially-crafted .off file can lead to a buffer overflow. An attacker can arbitrary code execution to trigger these vulnerabilities.This vulnerability exists within the code responsible for parsing comments within the geometric faces section within an OFF file.

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1784

Comment 1 Rohit Keshri 2024-05-30 08:09:29 UTC
Created meshlab tracking bugs for this issue:

Affects: fedora-all [bug 2283913]


Note You need to log in before you can comment on or make changes to this bug.