cve/2020/CVE-2020-35630.md
2024-06-18 02:51:15 +02:00

18 lines
996 B
Markdown

### [CVE-2020-35630](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35630)
![](https://img.shields.io/static/v1?label=Product&message=libcgal&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20CGAL-5.1.1%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-129%3A%20Improper%20Validation%20of%20Array%20Index&color=brighgreen)
### Description
Multiple code execution vulnerabilities exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. A specially crafted malformed file can lead to an out-of-bounds read and type confusion, which could lead to code execution. An attacker can provide malicious input to trigger any of these vulnerabilities. An oob read vulnerability exists in Nef_S2/SNC_io_parser.h SNC_io_parser<EW>::read_sface() sfh->center_vertex().
### POC
#### Reference
- https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225
#### Github
No PoCs found on GitHub currently.