cve/2020/CVE-2020-28611.md

20 lines
1.1 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2020-28611](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28611)
![](https://img.shields.io/static/v1?label=Product&message=libcgal&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20CGAL-5.1.1%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-129%3A%20Improper%20Validation%20of%20Array%20Index&color=brighgreen)
### Description
Multiple code execution vulnerabilities exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. A specially crafted malformed file can lead to an out-of-bounds read and type confusion, which could lead to code execution. An attacker can provide malicious input to trigger any of these vulnerabilities. An oob read vulnerability exists in Nef_S2/SM_io_parser.h SM_io_parser<Decorator_>::read_vertex() set_first_out_edge().
### POC
#### Reference
- https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225
2024-06-09 00:33:16 +00:00
- https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225
2024-05-25 21:48:12 +02:00
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Live-Hack-CVE/CVE-2020-28611