Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 29 Oct 2024 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Assimp
Assimp assimp |
|
| Weaknesses | CWE-120 | |
| CPEs | cpe:2.3:a:assimp:assimp:5.4.3:*:*:*:*:*:*:* | |
| Vendors & Products |
Assimp
Assimp assimp |
|
| Metrics |
ssvc
|
Fri, 25 Oct 2024 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-122 | |
| Metrics |
cvssV3_1
|
Fri, 25 Oct 2024 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | assimp: SEGV in SortByPTypeProcess::Execute | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Thu, 24 Oct 2024 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A segmentation fault (SEGV) was detected in the SortByPTypeProcess::Execute function in the Assimp library during fuzz testing with AddressSanitizer. The crash occurred due to a read access to an invalid memory address (0x1000c9714971). | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-10-29T19:24:29.174Z
Reserved: 2024-10-08T00:00:00
Link: CVE-2024-48426
Updated: 2024-10-29T19:24:22.086Z
Status : Analyzed
Published: 2024-10-24T21:15:14.387
Modified: 2025-05-28T21:06:42.670
Link: CVE-2024-48426
OpenCVE Enrichment
No data.