{"id":"CVE-2020-28602","details":"Multiple code execution vulnerabilities exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. A specially crafted malformed file can lead to an out-of-bounds read and type confusion, which could lead to code execution. An attacker can provide malicious input to trigger any of these vulnerabilities. An oob read vulnerability exists in Nef_2/PM_io_parser.h PM_io_parser\u003cPMDEC\u003e::read_vertex() Halfedge_of[].","modified":"2026-04-10T04:19:32.544026Z","published":"2022-04-18T17:15:12.363Z","references":[{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202305-34"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html"},{"type":"EVIDENCE","url":"https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/cgal/cgal","events":[{"introduced":"0"},{"last_affected":"8b649c42a258e3db346f19cb3ae89eca5fea877d"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"5.1.1"}]}}],"versions":["master_before_no_tws_nor_tabs","releases/CGAL-3.9-beta1","releases/CGAL-4.0","releases/CGAL-4.10-beta1","releases/CGAL-4.11-beta1","releases/CGAL-4.12","releases/CGAL-4.12-beta1","releases/CGAL-4.12-beta2","releases/CGAL-4.13","releases/CGAL-4.13-beta1","releases/CGAL-4.13-beta2","releases/CGAL-4.14","releases/CGAL-4.14-beta1","releases/CGAL-4.14-beta2","releases/CGAL-4.14-beta3","releases/CGAL-4.14-beta4","releases/CGAL-4.2","releases/CGAL-4.3","releases/CGAL-4.3-beta1","releases/CGAL-4.4","releases/CGAL-4.4-beta1","releases/CGAL-4.5-beta1","releases/CGAL-4.6","releases/CGAL-4.6-beta1","releases/CGAL-4.7-beta1","releases/CGAL-4.7-beta2","releases/CGAL-4.8-beta1","releases/CGAL-4.8-beta2","releases/CGAL-4.9","releases/CGAL-4.9-beta1","releases/CGAL-5.0","releases/CGAL-5.0-beta1","releases/CGAL-5.0-beta2","releases/CGAL-5.1-beta1","releases/CGAL-5.1-beta2","v4.14","v5.0","v5.1","v5.1-beta1","v5.1-beta2","v5.1.1"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"10.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-28602.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}