Vulnerabilities > CVE-2020-28599 - Out-of-bounds Write vulnerability in multiple products
Attack vector
LOCAL Attack complexity
LOW Privileges required
NONE Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
A stack-based buffer overflow vulnerability exists in the import_stl.cc:import_stl() functionality of Openscad openscad-2020.12-RC2. A specially crafted STL file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 12 | |
OS | 2 |
Common Weakness Enumeration (CWE)
References
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AFXQZK6BAYARVVWBBXDKPVPN3N77PPDX/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AFXQZK6BAYARVVWBBXDKPVPN3N77PPDX/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KRHYUWXQ7QQIC6TXDYYLYFFF7B7L3EBD/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KRHYUWXQ7QQIC6TXDYYLYFFF7B7L3EBD/
- https://security.gentoo.org/glsa/202107-35
- https://security.gentoo.org/glsa/202107-35
- https://talosintelligence.com/vulnerability_reports/TALOS-2020-1223
- https://talosintelligence.com/vulnerability_reports/TALOS-2020-1223
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1224
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1224