Stack-based buffer overflow in LoadOFF in bulletphysics bullet3 before 3.26 on all platforms allows remote attackers to execute arbitrary code via a crafted OFF file with an overlong initial token processed by the VHACD test utility or invoked indirectly through PyBullet's vhacd function.
                
            Metrics
Affected Vendors & Products
References
        History
                    Tue, 12 Aug 2025 12:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Bullet3 Project
         Bullet3 Project bullet3  | 
|
| Vendors & Products | 
        
        Bullet3 Project
         Bullet3 Project bullet3  | 
Mon, 11 Aug 2025 21:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        ssvc
         
  | 
Mon, 11 Aug 2025 04:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | Stack-based buffer overflow in LoadOFF in bulletphysics bullet3 before 3.26 on all platforms allows remote attackers to execute arbitrary code via a crafted OFF file with an overlong initial token processed by the VHACD test utility or invoked indirectly through PyBullet's vhacd function. | |
| Title | bullet3 VHACD utility: stack-based buffer overflow in OFF parser (LoadOFF) | |
| Weaknesses | CWE-120 | |
| References | 
         | |
| Metrics | 
        
        cvssV4_0
         
  | 
Status: PUBLISHED
Assigner: CyberArk
Published: 2025-08-11T04:24:02.469Z
Updated: 2025-08-11T20:32:47.464Z
Reserved: 2025-08-11T03:59:29.801Z
Link: CVE-2025-8854
Updated: 2025-08-11T20:32:36.490Z
Status : Awaiting Analysis
Published: 2025-08-11T05:15:27.187
Modified: 2025-08-11T21:15:29.203
Link: CVE-2025-8854
No data.