Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 29 Oct 2024 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Assimp
Assimp assimp |
|
| Weaknesses | CWE-120 | |
| CPEs | cpe:2.3:a:assimp:assimp:5.4.3:*:*:*:*:*:*:* | |
| Vendors & Products |
Assimp
Assimp assimp |
|
| Metrics |
ssvc
|
Fri, 25 Oct 2024 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-122 | |
| Metrics |
cvssV3_1
|
Fri, 25 Oct 2024 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | assimp: SEGV in SortByPTypeProcess::Execute | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Thu, 24 Oct 2024 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A segmentation fault (SEGV) was detected in the SortByPTypeProcess::Execute function in the Assimp library during fuzz testing with AddressSanitizer. The crash occurred due to a read access to an invalid memory address (0x1000c9714971). | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-10-29T19:24:29.174Z
Reserved: 2024-10-08T00:00:00.000Z
Link: CVE-2024-48426
Updated: 2024-10-29T19:24:22.086Z
Status : Analyzed
Published: 2024-10-24T21:15:14.387
Modified: 2025-05-28T21:06:42.670
Link: CVE-2024-48426
OpenCVE Enrichment
No data.