← Back to CVEs
CVE-2020-28619
HIGH8.8
Description
Multiple code execution vulnerabilities exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. A specially crafted malformed file can lead to an out-of-bounds read and type confusion, which could lead to code execution. An attacker can provide malicious input to trigger any of these vulnerabilities. An oob read vulnerability exists in Nef_S2/SNC_io_parser.h SNC_io_parser<EW>::read_edge() eh->twin().
CVE Details
CVSS v3.1 Score8.8
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionREQUIRED
Published4/18/2022
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
cgal:computational_geometry_algorithms_librarydebian:debian_linux
Weaknesses (CWE)
CWE-129CWE-125CWE-129
References
https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html(talos-cna@cisco.com)
https://security.gentoo.org/glsa/202305-34(talos-cna@cisco.com)
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225(talos-cna@cisco.com)
https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/202305-34(af854a3a-2127-422b-91ae-364da2661108)
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.