Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-28599

Опубликовано: 24 фев. 2021
Источник: debian
EPSS Низкий

Описание

A stack-based buffer overflow vulnerability exists in the import_stl.cc:import_stl() functionality of Openscad openscad-2020.12-RC2. A specially crafted STL file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
openscadfixed2021.01-1package
openscadfixed2019.01~RC2-2+deb10u1busterpackage
openscadno-dsastretchpackage

Примечания

  • https://talosintelligence.com/vulnerability_reports/TALOS-2020-1223

  • https://github.com/openscad/openscad/commit/07ea60f82e94a155f4926f17fad8e8366bc74874

EPSS

Процентиль: 80%
0.01358
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 5 лет назад

A stack-based buffer overflow vulnerability exists in the import_stl.cc:import_stl() functionality of Openscad openscad-2020.12-RC2. A specially crafted STL file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.

CVSS3: 7.8
nvd
почти 5 лет назад

A stack-based buffer overflow vulnerability exists in the import_stl.cc:import_stl() functionality of Openscad openscad-2020.12-RC2. A specially crafted STL file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.

CVSS3: 7.8
github
больше 3 лет назад

A stack-based buffer overflow vulnerability exists in the import_stl.cc:import_stl() functionality of Openscad openscad-2020.12-RC2. A specially crafted STL file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.

EPSS

Процентиль: 80%
0.01358
Низкий