Skip to main content

CVE-2020-28610: CWE-129: Improper Validation of Array Index in CGAL Project libcgal

Medium
Published: Mon Apr 18 2022 (04/18/2022, 16:55:58 UTC)
Source: CVE
Vendor/Project: CGAL Project
Product: libcgal

Description

Multiple code execution vulnerabilities exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. A specially crafted malformed file can lead to an out-of-bounds read and type confusion, which could lead to code execution. An attacker can provide malicious input to trigger any of these vulnerabilities. An oob read vulnerability exists in Nef_S2/SM_io_parser.h SM_io_parser<Decorator_>::read_vertex() set_face().

AI-Powered Analysis

AILast updated: 06/23/2025, 13:05:06 UTC

Technical Analysis

CVE-2020-28610 is a medium severity vulnerability identified in version 5.1.1 of the CGAL Project's libcgal library, specifically within the Nef polygon-parsing functionality. The root cause is improper validation of array indices (CWE-129) in the code handling polygon data structures. The vulnerability manifests as an out-of-bounds (OOB) read and type confusion triggered by specially crafted malformed input files. The affected code is located in the SM_io_parser<Decorator_>::read_vertex() and set_face() functions within the Nef_S2/SM_io_parser.h file. An attacker can exploit this by supplying malicious polygon files that cause the parser to read beyond the bounds of allocated arrays, leading to memory corruption. This memory corruption can result in type confusion, which may allow an attacker to execute arbitrary code within the context of the vulnerable application. The vulnerability does not require authentication but does require the application to process attacker-controlled polygon files, which implies user interaction or automated processing of untrusted inputs. No known exploits have been reported in the wild, and no official patches or fixes have been linked in the provided data. The vulnerability affects only CGAL version 5.1.1, a computational geometry library widely used in scientific computing, CAD, GIS, and other domains requiring complex geometric computations.

Potential Impact

European organizations utilizing CGAL libcgal 5.1.1 in their software stacks, especially those involved in CAD, GIS, scientific research, or engineering applications, face risks including unauthorized code execution, data corruption, and potential system compromise. Exploitation could lead to loss of confidentiality if sensitive data is accessed, integrity violations through corrupted geometric data, and availability issues if the application crashes or behaves unpredictably. Given the specialized nature of CGAL, the impact is likely concentrated in sectors relying on computational geometry, such as aerospace, automotive, manufacturing, and geospatial services. Compromise of such systems could disrupt critical design and analysis workflows, leading to operational delays and financial losses. Additionally, if these systems are integrated into larger enterprise environments or connected to networks, the vulnerability could serve as a foothold for lateral movement or further attacks. The lack of known exploits reduces immediate threat but does not eliminate risk, especially as attackers may develop exploits over time.

Mitigation Recommendations

Upgrade to a later, patched version of CGAL libcgal once available, as no patch is currently linked for version 5.1.1. Implement strict input validation and sanitization on all polygon files before processing, including rejecting malformed or suspicious files. Employ sandboxing or containerization for applications processing untrusted polygon data to limit potential damage from exploitation. Monitor application logs for unusual parsing errors or crashes that could indicate exploitation attempts. Restrict access to systems processing CGAL polygon files to trusted users and networks to reduce exposure. Conduct code audits and static analysis on custom software integrating libcgal to identify and remediate unsafe handling of polygon data. Where feasible, replace or supplement CGAL components with alternative libraries that have active maintenance and security support.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
talos
Date Reserved
2020-11-13T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9842c4522896dcbf29fc

Added to database: 5/21/2025, 9:09:22 AM

Last enriched: 6/23/2025, 1:05:06 PM

Last updated: 7/30/2025, 2:11:08 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats