6.8
CVSSv2

CVE-2020-28599

Published: 24/02/2021 Updated: 07/11/2023
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

A stack-based buffer overflow vulnerability exists in the import_stl.cc:import_stl() functionality of Openscad openscad-2020.12-RC2. A specially crafted STL file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

openscad openscad

fedoraproject fedora 32

fedoraproject fedora 33

Vendor Advisories

Debian Bug report logs - #996020 openscad: Buffer overflows in STL parser (CVE-2020-28599, CVE-2020-28600) Package: openscad; Maintainer for openscad is Kristian Nielsen <knielsen@knielsen-hqorg>; Source for openscad is src:openscad (PTS, buildd, popcon) Reported by: Kristian Nielsen <knielsen@knielsen-hqorg> Date: ...
A stack-based buffer overflow vulnerability exists in the import_stlcc:import_stl() functionality of Openscad openscad-202012-RC2 A specially crafted STL file can lead to code execution An attacker can provide a malicious file to trigger this vulnerability ...