{"id":"CVE-2023-35949","details":"Multiple stack-based buffer overflow vulnerabilities exist in the readOFF.cpp functionality of libigl v2.4.0. A specially-crafted .off file can lead to a buffer overflow. An attacker can arbitrary code execution to trigger these vulnerabilities.This vulnerability exists within the code responsible for parsing geometric faces of an OFF file.","modified":"2026-04-10T05:00:53.409666Z","published":"2024-05-28T14:15:08.420Z","references":[{"type":"EVIDENCE","url":"https://talosintelligence.com/vulnerability_reports/TALOS-2023-1784"},{"type":"EVIDENCE","url":"https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1784"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/libigl/libigl","events":[{"introduced":"0"},{"last_affected":"66b3ef2253e765d0ce0db74cec91bd706e5ba176"},{"introduced":"0"},{"last_affected":"fdaac01bcc52888994f7afd029dcc045dd408484"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"2.4.0"},{"introduced":"0"},{"last_affected":"2.5.0"}]}}],"versions":["v1.3.2","v1.3.3","v2.0.0","v2.1.0","v2.2.0","v2.3.0","v2.4.0","v2.5.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-35949.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}