A vulnerability was detected in OGRECave Ogre up to 14.4.1. The impacted element is the function Ogre::LogManager::stream of the file /ogre/OgreMain/src/OgreLogManager.cpp. Performing manipulation of the argument mDefaultLog results in null pointer dereference. The attack must be initiated from a local position. The exploit is now public and may be used.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-31359 A vulnerability was detected in OGRECave Ogre up to 14.4.1. The impacted element is the function Ogre::LogManager::stream of the file /ogre/OgreMain/src/OgreLogManager.cpp. Performing manipulation of the argument mDefaultLog results in null pointer dereference. The attack must be initiated from a local position. The exploit is now public and may be used.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 08 Oct 2025 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Ogre3d
Ogre3d ogre
CPEs cpe:2.3:a:ogre3d:ogre:*:*:*:*:*:*:*:*
Vendors & Products Ogre3d
Ogre3d ogre

Mon, 29 Sep 2025 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Ogrecave
Ogrecave ogre
Vendors & Products Ogrecave
Ogrecave ogre

Fri, 26 Sep 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 26 Sep 2025 14:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in OGRECave Ogre up to 14.4.1. The impacted element is the function Ogre::LogManager::stream of the file /ogre/OgreMain/src/OgreLogManager.cpp. Performing manipulation of the argument mDefaultLog results in null pointer dereference. The attack must be initiated from a local position. The exploit is now public and may be used.
Title OGRECave Ogre OgreLogManager.cpp stream null pointer dereference
Weaknesses CWE-404
CWE-476
References
Metrics cvssV2_0

{'score': 1.7, 'vector': 'AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 3.3, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 3.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2025-09-26T15:15:50.726Z

Reserved: 2025-09-26T06:50:23.504Z

Link: CVE-2025-11017

cve-icon Vulnrichment

Updated: 2025-09-26T15:15:46.492Z

cve-icon NVD

Status : Analyzed

Published: 2025-09-26T14:15:42.033

Modified: 2025-10-08T20:28:53.070

Link: CVE-2025-11017

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-09-29T09:30:20Z