Stack-based buffer overflow in LoadOFF in bulletphysics bullet3 before 3.26 on all platforms allows remote attackers to execute arbitrary code via a crafted OFF file with an overlong initial token processed by the VHACD test utility or invoked indirectly through PyBullet's vhacd function.
Metrics
Affected Vendors & Products
References
History
Mon, 11 Aug 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 11 Aug 2025 04:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Stack-based buffer overflow in LoadOFF in bulletphysics bullet3 before 3.26 on all platforms allows remote attackers to execute arbitrary code via a crafted OFF file with an overlong initial token processed by the VHACD test utility or invoked indirectly through PyBullet's vhacd function. | |
Title | bullet3 VHACD utility: stack-based buffer overflow in OFF parser (LoadOFF) | |
Weaknesses | CWE-120 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: CyberArk
Published: 2025-08-11T04:24:02.469Z
Updated: 2025-08-11T20:32:47.464Z
Reserved: 2025-08-11T03:59:29.801Z
Link: CVE-2025-8854

Updated: 2025-08-11T20:32:36.490Z

Status : Awaiting Analysis
Published: 2025-08-11T05:15:27.187
Modified: 2025-08-11T21:15:29.203
Link: CVE-2025-8854

No data.