Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 10 Jun 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:assimp:assimp:5.4.3:*:*:*:*:*:*:* |
Mon, 28 Oct 2024 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Assimp
Assimp assimp |
|
| Weaknesses | CWE-120 | |
| CPEs | cpe:2.3:a:assimp:assimp:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Assimp
Assimp assimp |
|
| Metrics |
ssvc
|
Fri, 25 Oct 2024 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | assimp: SEGV in Assimp::SplitLargeMeshesProcess_Triangle::UpdateNode | |
| Weaknesses | CWE-122 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Thu, 24 Oct 2024 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A segmentation fault (SEGV) was detected in the Assimp::SplitLargeMeshesProcess_Triangle::UpdateNode function within the Assimp library during fuzz testing using AddressSanitizer. The crash occurs due to a read access violation at address 0x000000000460, which points to the zero page, indicating a null or invalid pointer dereference. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-10-28T18:22:52.021Z
Reserved: 2024-10-08T00:00:00.000Z
Link: CVE-2024-48425
Updated: 2024-10-28T18:22:16.235Z
Status : Analyzed
Published: 2024-10-24T21:15:14.303
Modified: 2025-06-10T18:47:27.137
Link: CVE-2024-48425
OpenCVE Enrichment
No data.