
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2020-28614 is part of multiple code execution vulnerabilities discovered in the Nef polygon-parsing functionality of CGAL (Computational Geometry Algorithms Library) version CGAL-5.1.1. The vulnerability was disclosed in February 2021 and affects the CGAL library's ability to process geometric data (Talos Intelligence).
The vulnerability specifically exists in NefS2/SNCioparser.h SNCioparser::readvertex() vh->shalfedges_begin() function, where an out-of-bounds read vulnerability occurs. The issue stems from insufficient validation of array indices before accessing vector elements, which can lead to memory access violations. The vulnerability is classified under CWE-129 (Improper Validation of Array Index) (NVD CNA Status).
The vulnerability could lead to out-of-bounds read and type confusion, which could ultimately result in arbitrary code execution. When exploited, an attacker can provide malicious input to trigger the vulnerability and potentially execute arbitrary code on the affected system (Debian LTS).
The vulnerability has been addressed in newer versions of CGAL. For Debian 10 (buster), the fix was implemented in version 4.13-1+deb10u1. Gentoo users should upgrade to version 5.4.1 or later. Users are strongly recommended to upgrade their CGAL packages to the patched versions (Debian LTS, Gentoo Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."