{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-28616","assignerOrgId":"b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b","assignerShortName":"talos","dateUpdated":"2025-04-23T18:37:06.725Z","dateReserved":"2020-11-13T00:00:00.000Z","datePublished":"2022-04-18T16:56:09.105Z"},"containers":{"cna":{"datePublic":"2021-02-24T00:00:00.000Z","providerMetadata":{"orgId":"b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b","shortName":"talos","dateUpdated":"2023-05-30T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"Multiple code execution vulnerabilities exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. A specially crafted malformed file can lead to an out-of-bounds read and type confusion, which could lead to code execution. An attacker can provide malicious input to trigger any of these vulnerabilities. An oob read vulnerability exists in Nef_S2/SNC_io_parser.h SNC_io_parser<EW>::read_vertex() vh->sfaces_begin()."}],"affected":[{"vendor":"CGAL Project","product":"libcgal","versions":[{"version":"CGAL-5.1.1","status":"affected"}]}],"references":[{"url":"https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225"},{"name":"[debian-lts-announce] 20221206 [SECURITY] [DLA 3226-1] cgal security update","tags":["mailing-list"],"url":"https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html"},{"name":"GLSA-202305-34","tags":["vendor-advisory"],"url":"https://security.gentoo.org/glsa/202305-34"}],"metrics":[{"cvssV3_0":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":10,"baseSeverity":"CRITICAL"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-129: Improper Validation of Array Index","cweId":"CWE-129"}]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T16:40:59.802Z"},"title":"CVE Program Container","references":[{"url":"https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225","tags":["x_transferred"]},{"name":"[debian-lts-announce] 20221206 [SECURITY] [DLA 3226-1] cgal security update","tags":["mailing-list","x_transferred"],"url":"https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html"},{"name":"GLSA-202305-34","tags":["vendor-advisory","x_transferred"],"url":"https://security.gentoo.org/glsa/202305-34"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-23T13:11:24.872622Z","id":"CVE-2020-28616","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-23T18:37:06.725Z"}}]}}