Multiple improper array index validation vulnerabilities exist in the readMSH functionality of libigl v2.5.0. A specially crafted .msh file can lead to an out-of-bounds write. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability concerns the `igl::MshLoader::parse_element_field` function while handling an `binary`.msh` file.
History

Fri, 14 Feb 2025 08:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 12 Feb 2025 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Libigl
Libigl libigl
CPEs cpe:2.3:a:libigl:libigl:2.5.0:*:*:*:*:*:*:*
Vendors & Products Libigl
Libigl libigl

cve-icon MITRE

Status: PUBLISHED

Assigner: talos

Published:

Updated: 2025-02-13T17:40:04.868Z

Reserved: 2024-01-24T12:09:19.677Z

Link: CVE-2024-23950

cve-icon Vulnrichment

Updated: 2024-08-01T23:13:08.274Z

cve-icon NVD

Status : Analyzed

Published: 2024-05-28T14:15:10.907

Modified: 2025-02-12T15:27:11.963

Link: CVE-2024-23950

cve-icon Redhat

No data.