{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-28601","assignerOrgId":"b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b","assignerShortName":"talos","dateUpdated":"2025-04-23T19:45:02.229Z","dateReserved":"2020-11-13T00:00:00.000Z","datePublished":"2021-03-04T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b","shortName":"talos","dateUpdated":"2023-05-30T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"A code execution vulnerability exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. An oob read vulnerability exists in Nef_2/PM_io_parser.h PM_io_parser::read_vertex() Face_of[] OOB read. An attacker can provide malicious input to trigger this vulnerability."}],"affected":[{"vendor":"n/a","product":"CGAL","versions":[{"version":"CGAL Project libcgal CGAL-5.1.1","status":"affected"}]}],"references":[{"url":"https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225"},{"name":"FEDORA-2021-0d42c7cb33","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E4J344OKKDLPRN422OYRR46HDEN6MM6P/"},{"name":"FEDORA-2021-9de542ab4c","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NB5SF5OJR2DSV7CC6U7FVW5VJSJO5EKV/"},{"name":"[debian-lts-announce] 20210505 [SECURITY] [DLA 2649-1] cgal security update","tags":["mailing-list"],"url":"https://lists.debian.org/debian-lts-announce/2021/05/msg00002.html"},{"name":"[debian-lts-announce] 20221206 [SECURITY] [DLA 3226-1] cgal security update","tags":["mailing-list"],"url":"https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html"},{"name":"GLSA-202305-34","tags":["vendor-advisory"],"url":"https://security.gentoo.org/glsa/202305-34"}],"metrics":[{"cvssV3_0":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":10,"baseSeverity":"CRITICAL"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-129: Improper Validation of Array Index","cweId":"CWE-129"}]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T16:40:59.548Z"},"title":"CVE Program Container","references":[{"url":"https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225","tags":["x_transferred"]},{"name":"FEDORA-2021-0d42c7cb33","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E4J344OKKDLPRN422OYRR46HDEN6MM6P/"},{"name":"FEDORA-2021-9de542ab4c","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NB5SF5OJR2DSV7CC6U7FVW5VJSJO5EKV/"},{"name":"[debian-lts-announce] 20210505 [SECURITY] [DLA 2649-1] cgal security update","tags":["mailing-list","x_transferred"],"url":"https://lists.debian.org/debian-lts-announce/2021/05/msg00002.html"},{"name":"[debian-lts-announce] 20221206 [SECURITY] [DLA 3226-1] cgal security update","tags":["mailing-list","x_transferred"],"url":"https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html"},{"name":"GLSA-202305-34","tags":["vendor-advisory","x_transferred"],"url":"https://security.gentoo.org/glsa/202305-34"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-23T13:07:52.147027Z","id":"CVE-2020-28601","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-23T19:45:02.229Z"}}]}}