
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2020-28626 is a code execution vulnerability discovered in the Nef polygon-parsing functionality of CGAL libcgal version CGAL-5.1.1. The vulnerability was disclosed as part of a larger set of vulnerabilities affecting the CGAL library's polygon parsing capabilities (Talos, NVD).
The vulnerability specifically exists in the NefS2/SNCioparser.h file within the SNCioparser::readfacet() function, where an out-of-bounds read can occur when accessing fh->incidentvolume(). The issue stems from insufficient validation of array indices before using them to access vector elements, which can lead to type confusion and potential code execution ([Talos](https://talosintelligence.com/vulnerabilityreports/TALOS-2020-1225)).
When exploited, this vulnerability can lead to out-of-bounds read and type confusion, which could ultimately result in arbitrary code execution. The severity is considered high as it affects the core functionality of the CGAL library and could be triggered by processing maliciously crafted input files (Debian LTS).
The vulnerability has been addressed in subsequent versions of CGAL. Users are advised to upgrade to a patched version. For Debian 10 (buster), the fix was included in version 4.13-1+deb10u1. Gentoo users should upgrade to version 5.4.1 or later (Debian LTS, Gentoo Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."