CVE-2024-24684

7.8 HIGH

📋 TL;DR

This CVE describes multiple stack-based buffer overflow vulnerabilities in libigl v2.5.0's readOFF function. Attackers can exploit these by providing specially crafted .off files, potentially allowing arbitrary code execution. Any application using the vulnerable libigl version to process .off files is affected.

💻 Affected Systems

Products:
  • libigl
Versions: v2.5.0 (specifically mentioned, earlier versions may also be vulnerable)
Operating Systems: All platforms where libigl is used
Default Config Vulnerable: ⚠️ Yes
Notes: Any application that uses libigl's readOFF function to process .off files is vulnerable. This includes 3D modeling, CAD, and visualization software.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with the privileges of the application processing the .off file, potentially leading to full system compromise.

🟠

Likely Case

Application crash (denial of service) or limited code execution depending on exploit sophistication and memory protections.

🟢

If Mitigated

Application crash with no code execution if modern security features like ASLR and stack canaries are enabled.

🌐 Internet-Facing: MEDIUM - Requires user to upload or process malicious .off files, but many applications accept file uploads.
🏢 Internal Only: MEDIUM - Internal users could exploit if they can supply .off files to vulnerable applications.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires the attacker to supply a malicious .off file to an application using the vulnerable library. No authentication bypass is needed if file upload/processing is available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check libigl repository for latest version after fix

Vendor Advisory: https://github.com/libigl/libigl/issues

Restart Required: Yes

Instructions:

1. Check libigl GitHub repository for security updates. 2. Update to patched version. 3. Recompile any applications using libigl. 4. Restart affected applications.

🔧 Temporary Workarounds

Input validation for .off files

all

Implement strict validation of .off file headers before processing

Disable .off file processing

all

Temporarily disable functionality that processes .off files if not essential

🧯 If You Can't Patch

  • Implement strict file upload restrictions - only allow .off files from trusted sources
  • Run applications with minimal privileges and enable security features like ASLR, DEP, and stack canaries

🔍 How to Verify

Check if Vulnerable:

Check if your application uses libigl v2.5.0 and processes .off files via readOFF function

Check Version:

Check build configuration or dependency files for libigl version

Verify Fix Applied:

Verify libigl version is updated beyond v2.5.0 and test with known malicious .off files

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when processing .off files
  • Unusual memory access errors in logs

Network Indicators:

  • Unexpected .off file uploads to applications

SIEM Query:

Application:libigl AND (Event:Crash OR Event:BufferOverflow) AND FileExtension:.off

🔗 References

📤 Share & Export