7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.009 Low
EPSS
Percentile
82.9%
A code execution vulnerability exists in the Nef polygon-parsing
functionality of CGAL libcgal CGAL-5.1.1 in Nef_S2/SNC_io_parser.h
SNC_io_parser::read_sface() sfh->volume() OOB read. A specially crafted
malformed file can lead to an out-of-bounds read and type confusion, which
could lead to code execution. An attacker can provide malicious input to
trigger this vulnerability.
Author | Note |
---|---|
sbeattie | possible regression introduced by fix, see GH issue 5514 |
github.com/CGAL/cgal/issues/5345
github.com/CGAL/cgal/issues/5514
github.com/CGAL/cgal/pull/5371
launchpad.net/bugs/cve/CVE-2020-35636
nvd.nist.gov/vuln/detail/CVE-2020-35636
security-tracker.debian.org/tracker/CVE-2020-35636
talosintelligence.com/vulnerability_reports/TALOS-2020-1225
www.cve.org/CVERecord?id=CVE-2020-35636
7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.009 Low
EPSS
Percentile
82.9%