Stack-based buffer overflow in LoadOFF in bulletphysics bullet3 before 3.26 on all platforms allows remote attackers to execute arbitrary code via a crafted OFF file with an overlong initial token processed by the VHACD test utility or invoked indirectly through PyBullet's vhacd function.
Metrics
Affected Vendors & Products
References
History
Tue, 12 Aug 2025 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Bullet3 Project
Bullet3 Project bullet3 |
|
| Vendors & Products |
Bullet3 Project
Bullet3 Project bullet3 |
Mon, 11 Aug 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 11 Aug 2025 04:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Stack-based buffer overflow in LoadOFF in bulletphysics bullet3 before 3.26 on all platforms allows remote attackers to execute arbitrary code via a crafted OFF file with an overlong initial token processed by the VHACD test utility or invoked indirectly through PyBullet's vhacd function. | |
| Title | bullet3 VHACD utility: stack-based buffer overflow in OFF parser (LoadOFF) | |
| Weaknesses | CWE-120 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: CyberArk
Published: 2025-08-11T04:24:02.469Z
Updated: 2025-08-11T20:32:47.464Z
Reserved: 2025-08-11T03:59:29.801Z
Link: CVE-2025-8854
Updated: 2025-08-11T20:32:36.490Z
Status : Awaiting Analysis
Published: 2025-08-11T05:15:27.187
Modified: 2025-08-11T21:15:29.203
Link: CVE-2025-8854
No data.