{"id":"CVE-2020-28599","details":"A stack-based buffer overflow vulnerability exists in the import_stl.cc:import_stl() functionality of Openscad openscad-2020.12-RC2. A specially crafted STL file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.","modified":"2026-04-16T04:43:53.614410569Z","published":"2021-02-24T16:15:14.273Z","references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AFXQZK6BAYARVVWBBXDKPVPN3N77PPDX/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KRHYUWXQ7QQIC6TXDYYLYFFF7B7L3EBD/"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202107-35"},{"type":"EVIDENCE","url":"https://talosintelligence.com/vulnerability_reports/TALOS-2020-1223"},{"type":"EVIDENCE","url":"https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1224"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/openscad/openscad","events":[{"introduced":"0"},{"last_affected":"41f58fe57c03457a3a8b4dc541ef5654ec3e8c78"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"2021.01"}]}}],"versions":["openscad-2010.02","openscad-2013.01","openscad-2013.06","openscad-2019.01-RC1","openscad-2019.01-RC2","openscad-2019.01-RC3","openscad-2019.01-RC4","openscad-2019.05","openscad-2020.12-RC1","openscad-2020.12-RC2","openscad-2020.12-RC3","openscad-2020.12-RC4","openscad-2021.01","openscad-2021.01-RC5","openscad-2021.01-RC6"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"32"}]},{"events":[{"introduced":"0"},{"last_affected":"33"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-28599.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}