A code execution vulnerability exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1 in Nef_S2/SNC_io_parser.h SNC_io_parser::read_sface() sfh->volume() OOB read. A specially crafted malformed file can lead to an out-of-bounds read and type confusion, which could lead to code execution. An attacker can provide malicious input to trigger this vulnerability.
Subscriptions
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2649-1 | cgal security update |
Debian DLA |
DLA-3226-1 | cgal security update |
EUVD |
EUVD-2020-23302 | A code execution vulnerability exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1 in Nef_S2/SNC_io_parser.h SNC_io_parser::read_sface() sfh->volume() OOB read. A specially crafted malformed file can lead to an out-of-bounds read and type confusion, which could lead to code execution. An attacker can provide malicious input to trigger this vulnerability. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 23 Apr 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: talos
Published:
Updated: 2025-04-23T19:44:35.825Z
Reserved: 2020-12-22T00:00:00.000Z
Link: CVE-2020-35636
Updated: 2024-08-04T17:09:14.629Z
Status : Modified
Published: 2021-03-04T20:15:13.300
Modified: 2024-11-21T05:27:45.493
Link: CVE-2020-35636
No data.
OpenCVE Enrichment
No data.
Debian DLA
EUVD