CVE-2024-24684

HIGH

CVSS v3

7.8

HIGH

EPSS Score

21.9%

exploit probability

CISA KEV

No

known exploited

Exploitation

SSVC status

Description

Multiple stack-based buffer overflow vulnerabilities exist in the readOFF functionality of libigl v2.5.0. A specially crafted .off file can lead to stack-based buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability concerns the header parsing occuring while processing an `.off` file via the `readOFF` function. We can see above that at [0] a stack-based buffer called `comment` is defined with an hardcoded size of `1000 bytes`. The call t

Technical Details

CVSS v3 Vector
3.1
Published
5/28/2024
Last Modified
2/12/2025

Frequently Asked Questions

What is CVE-2024-24684?

Multiple stack-based buffer overflow vulnerabilities exist in the readOFF functionality of libigl v2.5.0. A specially crafted .off file can lead to stack-based buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability concerns the header parsing occuring while processing an `.off` file via the `readOFF` function. We can see above that at [0] a stack-based buffer called `comment` is defined with an hardcoded size of `1000 bytes`. The call t

Is CVE-2024-24684 actively exploited?

Active exploitation of CVE-2024-24684 has not been confirmed. The EPSS score is 21.9%, indicating the estimated probability of exploitation in the next 30 days.

What is the CVSS score for CVE-2024-24684?

CVE-2024-24684 has a CVSS v3 base score of 7.8 (HIGH severity), with vector string 3.1.

Is CVE-2024-24684 affecting your environment?

Use isMalicious to check if any of your IPs or domains are associated with this vulnerability's IOCs.