Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 10 Jun 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:assimp:assimp:5.4.3:*:*:*:*:*:*:* |
Mon, 28 Oct 2024 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Assimp
Assimp assimp |
|
| Weaknesses | CWE-120 | |
| CPEs | cpe:2.3:a:assimp:assimp:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Assimp
Assimp assimp |
|
| Metrics |
ssvc
|
Fri, 25 Oct 2024 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | assimp: SEGV in Assimp::SplitLargeMeshesProcess_Triangle::UpdateNode | |
| Weaknesses | CWE-122 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Thu, 24 Oct 2024 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A segmentation fault (SEGV) was detected in the Assimp::SplitLargeMeshesProcess_Triangle::UpdateNode function within the Assimp library during fuzz testing using AddressSanitizer. The crash occurs due to a read access violation at address 0x000000000460, which points to the zero page, indicating a null or invalid pointer dereference. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-10-28T18:22:52.021Z
Reserved: 2024-10-08T00:00:00
Link: CVE-2024-48425
Updated: 2024-10-28T18:22:16.235Z
Status : Analyzed
Published: 2024-10-24T21:15:14.303
Modified: 2025-06-10T18:47:27.137
Link: CVE-2024-48425
OpenCVE Enrichment
No data.