Description
Stack-based buffer overflow in LoadOFF in bulletphysics bullet3 before 3.26 on all platforms allows remote attackers to execute arbitrary code via a crafted OFF file with an overlong initial token processed by the VHACD test utility or invoked indirectly through PyBullet's vhacd function.
Problem types
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Product status
<= 3.25
Timeline
2024-12-01: | Initial vendor notification (no response) |
2025-08-10: | Public disclosure via GitHub issue |
Credits
Simcha Kosman
References
github.com/...ob/master/Extras/VHACD/test/src/main_vhacd.cpp
github.com/bulletphysics/bullet3/issues/4732