An out-of-bounds write vulnerability exists in the readNODE functionality of libigl v2.5.0. A specially crafted .node file can lead to an out-of-bounds write. An attacker can provide a malicious file to trigger this vulnerability.
The product uses untrusted input when calculating or using an array index, but the product does not validate or incorrectly validates the index to ensure the index references a valid position within the array.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2024-1930 | third party advisory exploit |
https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1930 | third party advisory exploit |