Bug ID 1225657
Summary VUL-0: CVE-2024-24684: meshlab: stack-based buffer overflow vulnerabilities exist in the readOFF
Classification openSUSE
Product openSUSE Distribution
Version Leap 15.6
Hardware Other
URL https://smash.suse.de/issue/407924/
OS Other
Status NEW
Severity Normal
Priority P5 - None
Component Security
Assignee martin.liska@suse.com
Reporter smash_bz@suse.de
QA Contact security-team@suse.de
CC stoyan.manolov@suse.com
Target Milestone ---
Found By Security Response Team
Blocker ---

Multiple stack-based buffer overflow vulnerabilities exist in the readOFF
functionality of libigl v2.5.0. A specially crafted .off file can lead to
stack-based buffer overflow. An attacker can provide a malicious file to
trigger this vulnerability.This vulnerability concerns the header parsing
occuring while processing an `.off`  file via the `readOFF` function. 


We can see above that at [0] a stack-based buffer called `comment` is defined
with an hardcoded size of `1000 bytes`.  The call to `fscanf` at [1] is unsafe
and if the first line of the header of the `.off` files is longer than 1000
bytes it will overflow the `header` buffer.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24684
https://www.cve.org/CVERecord?id=CVE-2024-24684
https://talosintelligence.com/vulnerability_reports/TALOS-2024-1929
https://bugzilla.redhat.com/show_bug.cgi?id=2283904


You are receiving this mail because: