[Bug 1225657] New: VUL-0: CVE-2024-24684: meshlab: stack-based buffer overflow vulnerabilities exist in the readOFF
![](https://seccdn.libravatar.org/avatar/a895f78a81a109471893519443e4d933.jpg?s=120&d=mm&r=g)
https://bugzilla.suse.com/show_bug.cgi?id=1225657 Bug ID: 1225657 Summary: VUL-0: CVE-2024-24684: meshlab: stack-based buffer overflow vulnerabilities exist in the readOFF Classification: openSUSE Product: openSUSE Distribution Version: Leap 15.6 Hardware: Other URL: https://smash.suse.de/issue/407924/ OS: Other Status: NEW Severity: Normal Priority: P5 - None Component: Security Assignee: martin.liska@suse.com Reporter: smash_bz@suse.de QA Contact: security-team@suse.de CC: stoyan.manolov@suse.com Target Milestone: --- Found By: Security Response Team Blocker: --- Multiple stack-based buffer overflow vulnerabilities exist in the readOFF functionality of libigl v2.5.0. A specially crafted .off file can lead to stack-based buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability concerns the header parsing occuring while processing an `.off` file via the `readOFF` function. We can see above that at [0] a stack-based buffer called `comment` is defined with an hardcoded size of `1000 bytes`. The call to `fscanf` at [1] is unsafe and if the first line of the header of the `.off` files is longer than 1000 bytes it will overflow the `header` buffer. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-24684 https://www.cve.org/CVERecord?id=CVE-2024-24684 https://talosintelligence.com/vulnerability_reports/TALOS-2024-1929 https://bugzilla.redhat.com/show_bug.cgi?id=2283904 -- You are receiving this mail because: You are on the CC list for the bug.
![](https://seccdn.libravatar.org/avatar/a895f78a81a109471893519443e4d933.jpg?s=120&d=mm&r=g)
https://bugzilla.suse.com/show_bug.cgi?id=1225657
Maintenance Automation
participants (1)
-
bugzilla_noreply@suse.com