<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Memory-Disclosure — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/memory-disclosure/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 23 Mar 2026 16:16:48 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/memory-disclosure/feed.xml" rel="self" type="application/rss+xml"/><item><title>cgltf Integer Overflow Vulnerability in Sparse Accessor Validation</title><link>https://feed.craftedsignal.io/briefs/2026-03-cgltf-overflow/</link><pubDate>Mon, 23 Mar 2026 16:16:48 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-cgltf-overflow/</guid><description>cgltf version 1.15 and prior contain an integer overflow vulnerability in the cgltf_validate() function when validating sparse accessors, allowing attackers to trigger out-of-bounds reads via crafted glTF/GLB files, leading to denial of service and potential memory disclosure.</description><content:encoded><![CDATA[<p>cgltf is a minimalist C library for loading glTF 2.0 files. Versions 1.15 and earlier are vulnerable to an integer overflow in the <code>cgltf_validate()</code> function. This vulnerability occurs during the validation of sparse accessors within glTF/GLB files. An attacker can exploit this by crafting malicious glTF/GLB files with specifically chosen size values that trigger integer overflows in arithmetic operations during sparse accessor validation. Successful exploitation leads to out-of-bounds reads due to heap buffer over-reads in <code>cgltf_calc_index_bound()</code>. This results in a denial-of-service condition (application crash) and potentially leads to memory disclosure. Defenders should monitor applications parsing glTF/GLB files for unexpected crashes or abnormal memory access patterns.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious glTF or GLB file.</li>
<li>The crafted file contains a sparse accessor with attacker-controlled size values designed to cause an integer overflow.</li>
<li>The vulnerable application uses the cgltf library to parse the malicious glTF/GLB file.</li>
<li>The <code>cgltf_validate()</code> function is called to validate the glTF data, including the sparse accessor.</li>
<li>During sparse accessor validation, unchecked arithmetic operations occur with the attacker-controlled size values, resulting in an integer overflow.</li>
<li>The integer overflow leads to an incorrect calculation of the index bound in the <code>cgltf_calc_index_bound()</code> function.</li>
<li><code>cgltf_calc_index_bound()</code> attempts to access a heap buffer using the incorrect index bound.</li>
<li>This results in an out-of-bounds read, causing a denial of service (application crash) or potentially exposing sensitive memory contents.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability results in a denial-of-service condition, as the application parsing the malicious glTF/GLB file crashes. Furthermore, the out-of-bounds read could potentially expose sensitive information from the application&rsquo;s memory. The number of potential victims depends on the prevalence of applications using the vulnerable cgltf library to process potentially untrusted glTF/GLB files. Sectors affected could include any application that handles 3D models or scenes using the glTF format, such as game development, CAD software, and visualization tools.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to a patched version of the cgltf library that addresses CVE-2026-32845.</li>
<li>Implement input validation on glTF/GLB files before parsing them with cgltf to prevent malicious size values from reaching the vulnerable <code>cgltf_validate()</code> function.</li>
<li>Deploy the Sigma rule &ldquo;Detect glTF Parsing Process Crash&rdquo; to identify processes crashing while parsing glTF/GLB files, which can indicate exploitation attempts.</li>
<li>Enable process crash reporting to collect detailed information about crashes, including memory dumps, which can aid in identifying the root cause and potential memory disclosure.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>integer-overflow</category><category>denial-of-service</category><category>memory-disclosure</category><category>glTF</category><category>cgltf</category></item></channel></rss>