Lucene search

K
ubuntucveUbuntu.comUB:CVE-2020-28589
HistoryAug 11, 2021 - 12:00 a.m.

CVE-2020-28589

2021-08-1100:00:00
ubuntu.com
ubuntu.com
8
cve-2020-28589
loadobj functionality
code execution
malicious file
unix
vulnerability

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.003

Percentile

66.2%

An improper array index validation vulnerability exists in the LoadObj
functionality of tinyobjloader v2.0-rc1 and tinyobjloader development
commit 79d4421. A specially crafted file could lead to code execution. An
attacker can provide a malicious file to trigger this vulnerability.

OSVersionArchitecturePackageVersionFilename
ubuntu22.04noarchtinyobjloader< anyUNKNOWN
ubuntu24.04noarchtinyobjloader< anyUNKNOWN

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.003

Percentile

66.2%

Related for UB:CVE-2020-28589