CVE-2024-23950

Multiple improper array index validation vulnerabilities exist in the readMSH functionality of libigl v2.5.0. A specially crafted .msh file can lead to an out-of-bounds write. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability concerns the `igl::MshLoader::parse_element_field` function while handling an `binary`.msh` file.
References
Link Resource
https://talosintelligence.com/vulnerability_reports/TALOS-2024-1926 Technical Description Third Party Advisory
https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1926 Technical Description Third Party Advisory
https://talosintelligence.com/vulnerability_reports/TALOS-2024-1926 Technical Description Third Party Advisory
https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1926 Technical Description Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:libigl:libigl:2.5.0:*:*:*:*:*:*:*

History

12 Feb 2025, 15:27

Type Values Removed Values Added
References () https://talosintelligence.com/vulnerability_reports/TALOS-2024-1926 - () https://talosintelligence.com/vulnerability_reports/TALOS-2024-1926 - Technical Description, Third Party Advisory
References () https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1926 - () https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1926 - Technical Description, Third Party Advisory
First Time Libigl
Libigl libigl
CPE cpe:2.3:a:libigl:libigl:2.5.0:*:*:*:*:*:*:*

21 Nov 2024, 08:58

Type Values Removed Values Added
References () https://talosintelligence.com/vulnerability_reports/TALOS-2024-1926 - () https://talosintelligence.com/vulnerability_reports/TALOS-2024-1926 -
References () https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1926 - () https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1926 -

10 Jun 2024, 17:16

Type Values Removed Values Added
Summary
  • (es) Existen múltiples vulnerabilidades de validación de índice de matriz incorrecta en la funcionalidad readMSH de libigl v2.5.0. Un archivo .msh especialmente manipulado puede provocar una escritura fuera de los límites. Un atacante puede proporcionar un archivo malicioso para desencadenar esta vulnerabilidad. Esta vulnerabilidad afecta a la función `igl::MshLoader::parse_element_field` mientras maneja un archivo `binary`.msh`.
References
  • () https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1926 -

28 May 2024, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-28 14:15

Updated : 2025-02-12 15:27


NVD link : CVE-2024-23950

Mitre link : CVE-2024-23950

CVE.ORG link : CVE-2024-23950


JSON object : View

Products Affected

libigl

  • libigl
CWE
CWE-787

Out-of-bounds Write