CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
71.9%
A code execution vulnerability exists in the Nef polygon-parsing
functionality of CGAL libcgal CGAL-5.1.1. An oob read vulnerability exists
in Nef_S2/SNC_io_parser.h SNC_io_parser::read_sloop() slh->twin() An
attacker can provide malicious input to trigger this vulnerability.
Author | Note |
---|---|
sbeattie | possible regression introduced by fix, see GH issue 5514 |
github.com/CGAL/cgal/issues/5345
github.com/CGAL/cgal/issues/5514
github.com/CGAL/cgal/pull/5371
launchpad.net/bugs/cve/CVE-2020-28636
nvd.nist.gov/vuln/detail/CVE-2020-28636
security-tracker.debian.org/tracker/CVE-2020-28636
talosintelligence.com/vulnerability_reports/TALOS-2020-1225
www.cve.org/CVERecord?id=CVE-2020-28636
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
71.9%