{"id":"CVE-2024-23949","details":"Multiple improper array index validation vulnerabilities exist in the readMSH functionality of libigl v2.5.0. A specially crafted .msh file can lead to an out-of-bounds write. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability concerns the `igl::MshLoader::parse_node_field` function while handling an `ascii`.msh` file.","modified":"2026-04-10T05:09:43.703427Z","published":"2024-05-28T14:15:10.687Z","references":[{"type":"ADVISORY","url":"https://talosintelligence.com/vulnerability_reports/TALOS-2024-1926"},{"type":"ADVISORY","url":"https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1926"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/libigl/libigl","events":[{"introduced":"0"},{"last_affected":"fdaac01bcc52888994f7afd029dcc045dd408484"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"2.5.0"}]}}],"versions":["v1.3.2","v1.3.3","v2.0.0","v2.1.0","v2.2.0","v2.3.0","v2.4.0","v2.5.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-23949.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}