Stack-based buffer overflow in LoadOFF in bulletphysics bullet3 before 3.26 on all platforms allows remote attackers to execute arbitrary code via a crafted OFF file with an overlong initial token processed by the VHACD test utility or invoked indirectly through PyBullet's vhacd function.
CVSS
No CVSS.
References
Configurations
No configuration.
History
11 Aug 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/bulletphysics/bullet3/issues/4732 - |
11 Aug 2025, 18:32
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
11 Aug 2025, 05:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-11 05:15
Updated : 2025-08-11 21:15
NVD link : CVE-2025-8854
Mitre link : CVE-2025-8854
CVE.ORG link : CVE-2025-8854
JSON object : View
Products Affected
No product.
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')