cve/2020/CVE-2020-28606.md

19 lines
1.0 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2020-28606](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28606)
![](https://img.shields.io/static/v1?label=Product&message=libcgal&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20CGAL-5.1.1%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-129%3A%20Improper%20Validation%20of%20Array%20Index&color=brighgreen)
### Description
Multiple code execution vulnerabilities exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. A specially crafted malformed file can lead to an out-of-bounds read and type confusion, which could lead to code execution. An attacker can provide malicious input to trigger any of these vulnerabilities. An oob read vulnerability exists in Nef_2/PM_io_parser.h PM_io_parser<PMDEC>::read_hedge() e->set_face().
### POC
#### Reference
- https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225
2024-06-09 00:33:16 +00:00
- https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225
2024-05-25 21:48:12 +02:00
#### Github
- https://github.com/Live-Hack-CVE/CVE-2020-28606