
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2020-35631 is a code execution vulnerability discovered in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. The vulnerability specifically exists in NefS2/SNCioparser.h SNCioparser::readsface() SD.linkasfacecycle(). A specially crafted malformed file can lead to an out-of-bounds read and type confusion, which could result in code execution ([Talos Report](https://talosintelligence.com/vulnerabilityreports/TALOS-2020-1225)).
The vulnerability is classified as CWE-129 (Improper Validation of Array Index) and has a CVSSv3 score of 10.0 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H). The issue occurs during the parsing of Nef polygon data where there is no proper validation of array indices before accessing them, leading to out-of-bounds read vulnerabilities (Talos Report).
The vulnerability allows an attacker to potentially execute arbitrary code through specially crafted malformed files. The high CVSS score of 10.0 indicates critical severity with potential for complete compromise of confidentiality, integrity, and availability of the affected system (Talos Report).
The vulnerability has been fixed in newer versions of the software. Users are recommended to upgrade their CGAL packages. For Debian 10 buster, the fix was implemented in version 4.13-1+deb10u1. For Gentoo users, upgrading to version 5.4.1 or later is recommended (Gentoo Security, Debian LTS).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."