All the vulnerabilites related to Open Asset Import Library - Assimp
cve-2025-2750
Vulnerability from cvelistv5
Published
2025-03-25 07:31
Modified
2025-03-31 17:38
Severity ?
5.3 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
6.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
6.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
6.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
6.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
EPSS score ?
Summary
Open Asset Import Library Assimp CSM File CSMLoader.cpp InternReadFile out-of-bounds write
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.300855 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.300855 | signature, permissions-required | |
https://vuldb.com/?submit.517783 | third-party-advisory | |
https://github.com/assimp/assimp/issues/6011 | issue-tracking | |
https://github.com/assimp/assimp/issues/6011#issue-2877369004 | exploit, issue-tracking |
Impacted products
▼ | Vendor | Product |
---|---|---|
Open Asset Import Library | Assimp |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-2750", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-31T17:36:47.193325Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-31T17:38:57.671Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "modules": [ "CSM File Handler" ], "product": "Assimp", "vendor": "Open Asset Import Library", "versions": [ { "status": "affected", "version": "5.4.3" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "d3ng03 (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in Open Asset Import Library Assimp 5.4.3. This affects the function Assimp::CSMImporter::InternReadFile of the file code/AssetLib/CSM/CSMLoader.cpp of the component CSM File Handler. The manipulation leads to out-of-bounds write. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." }, { "lang": "de", "value": "Es wurde eine kritische Schwachstelle in Open Asset Import Library Assimp 5.4.3 gefunden. Es betrifft die Funktion Assimp::CSMImporter::InternReadFile der Datei code/AssetLib/CSM/CSMLoader.cpp der Komponente CSM File Handler. Mittels dem Manipulieren mit unbekannten Daten kann eine out-of-bounds write-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "Out-of-bounds Write", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-119", "description": "Memory Corruption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-25T07:31:03.681Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-300855 | Open Asset Import Library Assimp CSM File CSMLoader.cpp InternReadFile out-of-bounds write", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.300855" }, { "name": "VDB-300855 | CTI Indicators (IOB, IOC, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.300855" }, { "name": "Submit #517783 | Open Asset Import Library Assimp \u003e=5.4.3 Out-of-bounds Write", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.517783" }, { "tags": [ "issue-tracking" ], "url": "https://github.com/assimp/assimp/issues/6011" }, { "tags": [ "exploit", "issue-tracking" ], "url": "https://github.com/assimp/assimp/issues/6011#issue-2877369004" } ], "timeline": [ { "lang": "en", "time": "2025-03-24T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-03-24T01:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-03-24T17:54:08.000Z", "value": "VulDB entry last update" } ], "title": "Open Asset Import Library Assimp CSM File CSMLoader.cpp InternReadFile out-of-bounds write" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-2750", "datePublished": "2025-03-25T07:31:03.681Z", "dateReserved": "2025-03-24T16:47:17.254Z", "dateUpdated": "2025-03-31T17:38:57.671Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-2756
Vulnerability from cvelistv5
Published
2025-03-25 09:31
Modified
2025-03-31 16:26
Severity ?
5.3 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
6.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
6.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
6.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
6.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
EPSS score ?
Summary
Open Asset Import Library Assimp AC3D File ACLoader.cpp ConvertObjectSection heap-based overflow
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.300861 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.300861 | signature, permissions-required | |
https://vuldb.com/?submit.517790 | third-party-advisory | |
https://github.com/assimp/assimp/issues/6018 | issue-tracking | |
https://github.com/assimp/assimp/issues/6018#issue-2877375815 | exploit, issue-tracking |
Impacted products
▼ | Vendor | Product |
---|---|---|
Open Asset Import Library | Assimp |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-2756", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-31T16:26:11.574139Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-31T16:26:30.042Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "modules": [ "AC3D File Handler" ], "product": "Assimp", "vendor": "Open Asset Import Library", "versions": [ { "status": "affected", "version": "5.4.3" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "d3ng03 (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in Open Asset Import Library Assimp 5.4.3. This affects the function Assimp::AC3DImporter::ConvertObjectSection of the file code/AssetLib/AC/ACLoader.cpp of the component AC3D File Handler. The manipulation of the argument tmp leads to heap-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." }, { "lang": "de", "value": "Es wurde eine Schwachstelle in Open Asset Import Library Assimp 5.4.3 entdeckt. Sie wurde als kritisch eingestuft. Hiervon betroffen ist die Funktion Assimp::AC3DImporter::ConvertObjectSection der Datei code/AssetLib/AC/ACLoader.cpp der Komponente AC3D File Handler. Dank der Manipulation des Arguments tmp mit unbekannten Daten kann eine heap-based buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk angegangen werden. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-119", "description": "Memory Corruption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-25T09:31:04.310Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-300861 | Open Asset Import Library Assimp AC3D File ACLoader.cpp ConvertObjectSection heap-based overflow", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.300861" }, { "name": "VDB-300861 | CTI Indicators (IOB, IOC, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.300861" }, { "name": "Submit #517790 | Open Asset Import Library Assimp \u003e=5.4.3 Heap-based Buffer Overflow", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.517790" }, { "tags": [ "issue-tracking" ], "url": "https://github.com/assimp/assimp/issues/6018" }, { "tags": [ "exploit", "issue-tracking" ], "url": "https://github.com/assimp/assimp/issues/6018#issue-2877375815" } ], "timeline": [ { "lang": "en", "time": "2025-03-24T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-03-24T01:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-03-24T17:54:16.000Z", "value": "VulDB entry last update" } ], "title": "Open Asset Import Library Assimp AC3D File ACLoader.cpp ConvertObjectSection heap-based overflow" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-2756", "datePublished": "2025-03-25T09:31:04.310Z", "dateReserved": "2025-03-24T16:47:34.456Z", "dateUpdated": "2025-03-31T16:26:30.042Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-5165
Vulnerability from cvelistv5
Published
2025-05-26 02:31
Modified
2025-05-28 17:37
Severity ?
4.8 (Medium) - CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
3.3 (Low) - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
3.3 (Low) - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
EPSS score ?
Summary
Open Asset Import Library Assimp MDCLoader.cpp ValidateSurfaceHeader out-of-bounds
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.310253 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.310253 | signature, permissions-required | |
https://vuldb.com/?submit.578000 | third-party-advisory | |
https://github.com/assimp/assimp/issues/6167 | issue-tracking | |
https://github.com/assimp/assimp/issues/6128 | issue-tracking | |
https://github.com/user-attachments/files/20204942/reproducer.zip | exploit |
Impacted products
▼ | Vendor | Product |
---|---|---|
Open Asset Import Library | Assimp |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-5165", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-27T14:20:03.872037Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-28T17:37:11.112Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://github.com/assimp/assimp/issues/6167" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Assimp", "vendor": "Open Asset Import Library", "versions": [ { "status": "affected", "version": "5.4.3" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Open Asset Import Library Assimp 5.4.3 and classified as problematic. This issue affects the function MDCImporter::ValidateSurfaceHeader of the file assimp/code/AssetLib/MDC/MDCLoader.cpp. The manipulation of the argument pcSurface2 leads to out-of-bounds read. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The project decided to collect all Fuzzer bugs in a main-issue to address them in the future." }, { "lang": "de", "value": "Eine problematische Schwachstelle wurde in Open Asset Import Library Assimp 5.4.3 gefunden. Betroffen davon ist die Funktion MDCImporter::ValidateSurfaceHeader der Datei assimp/code/AssetLib/MDC/MDCLoader.cpp. Durch das Beeinflussen des Arguments pcSurface2 mit unbekannten Daten kann eine out-of-bounds read-Schwachstelle ausgenutzt werden. Umgesetzt werden muss der Angriff lokal. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 1.7, "vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-Bounds Read", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-119", "description": "Memory Corruption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-26T02:31:05.900Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-310253 | Open Asset Import Library Assimp MDCLoader.cpp ValidateSurfaceHeader out-of-bounds", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.310253" }, { "name": "VDB-310253 | CTI Indicators (IOB, IOC, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.310253" }, { "name": "Submit #578000 | Open Asset Import Library Assimp 5.4.3 Heap Out of Bounds Read", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.578000" }, { "tags": [ "issue-tracking" ], "url": "https://github.com/assimp/assimp/issues/6167" }, { "tags": [ "issue-tracking" ], "url": "https://github.com/assimp/assimp/issues/6128" }, { "tags": [ "exploit" ], "url": "https://github.com/user-attachments/files/20204942/reproducer.zip" } ], "timeline": [ { "lang": "en", "time": "2025-05-25T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-05-25T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-05-25T15:19:37.000Z", "value": "VulDB entry last update" } ], "title": "Open Asset Import Library Assimp MDCLoader.cpp ValidateSurfaceHeader out-of-bounds" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-5165", "datePublished": "2025-05-26T02:31:05.900Z", "dateReserved": "2025-05-25T13:14:20.944Z", "dateUpdated": "2025-05-28T17:37:11.112Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-3548
Vulnerability from cvelistv5
Published
2025-04-14 02:31
Modified
2025-04-14 14:56
Severity ?
4.8 (Medium) - CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
5.3 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
5.3 (Medium) - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
5.3 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
5.3 (Medium) - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
EPSS score ?
Summary
Open Asset Import Library Assimp File types.h Set heap-based overflow
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.304589 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.304589 | signature, permissions-required | |
https://vuldb.com/?submit.546413 | third-party-advisory | |
https://github.com/assimp/assimp/issues/6068 | issue-tracking | |
https://github.com/user-attachments/files/19580584/aiString_Set-hbo.zip | exploit | |
https://github.com/assimp/assimp/pull/6073 | issue-tracking, patch |
Impacted products
▼ | Vendor | Product |
---|---|---|
Open Asset Import Library | Assimp |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-3548", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-14T14:55:47.528742Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-14T14:56:10.933Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "modules": [ "File Handler" ], "product": "Assimp", "vendor": "Open Asset Import Library", "versions": [ { "status": "affected", "version": "5.4.0" }, { "status": "affected", "version": "5.4.1" }, { "status": "affected", "version": "5.4.2" }, { "status": "affected", "version": "5.4.3" } ] } ], "credits": [ { "lang": "en", "type": "tool", "value": "VulDB GitHub Analyzer" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in Open Asset Import Library Assimp up to 5.4.3. This issue affects the function aiString::Set in the library include/assimp/types.h of the component File Handler. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue." }, { "lang": "de", "value": "Eine Schwachstelle wurde in Open Asset Import Library Assimp bis 5.4.3 entdeckt. Sie wurde als kritisch eingestuft. Hierbei geht es um die Funktion aiString::Set in der Bibliothek include/assimp/types.h der Komponente File Handler. Durch Beeinflussen mit unbekannten Daten kann eine heap-based buffer overflow-Schwachstelle ausgenutzt werden. Umgesetzt werden muss der Angriff lokal. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung. Als bestm\u00f6gliche Massnahme wird Patching empfohlen." } ], "metrics": [ { "cvssV4_0": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 4.3, "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-119", "description": "Memory Corruption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-14T02:31:05.592Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-304589 | Open Asset Import Library Assimp File types.h Set heap-based overflow", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.304589" }, { "name": "VDB-304589 | CTI Indicators (IOB, IOC, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.304589" }, { "name": "Submit #546413 | Open Asset Import Library Assimp v5.4.3 Heap-based Buffer Overflow", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.546413" }, { "tags": [ "issue-tracking" ], "url": "https://github.com/assimp/assimp/issues/6068" }, { "tags": [ "exploit" ], "url": "https://github.com/user-attachments/files/19580584/aiString_Set-hbo.zip" }, { "tags": [ "issue-tracking", "patch" ], "url": "https://github.com/assimp/assimp/pull/6073" } ], "timeline": [ { "lang": "en", "time": "2025-04-13T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-04-13T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-04-13T19:50:27.000Z", "value": "VulDB entry last update" } ], "title": "Open Asset Import Library Assimp File types.h Set heap-based overflow" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-3548", "datePublished": "2025-04-14T02:31:05.592Z", "dateReserved": "2025-04-13T17:45:16.448Z", "dateUpdated": "2025-04-14T14:56:10.933Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-2592
Vulnerability from cvelistv5
Published
2025-03-21 14:00
Modified
2025-03-21 14:25
Severity ?
5.3 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
6.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
6.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
6.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
6.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
EPSS score ?
Summary
Open Asset Import Library Assimp CSMLoader.cpp InternReadFile heap-based overflow
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.300575 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.300575 | signature, permissions-required | |
https://vuldb.com/?submit.517782 | third-party-advisory | |
https://github.com/assimp/assimp/issues/6010 | issue-tracking | |
https://github.com/assimp/assimp/pull/6052 | issue-tracking | |
https://github.com/assimp/assimp/issues/6010#issue-2877368110 | exploit, issue-tracking | |
https://github.com/assimp/assimp/commit/2690e354da0c681db000cfd892a55226788f2743 | patch |
Impacted products
▼ | Vendor | Product |
---|---|---|
Open Asset Import Library | Assimp |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-2592", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-21T14:25:53.767940Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-21T14:25:58.496Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Assimp", "vendor": "Open Asset Import Library", "versions": [ { "status": "affected", "version": "5.4.3" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "d3ng03 (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in Open Asset Import Library Assimp 5.4.3. This issue affects the function CSMImporter::InternReadFile of the file code/AssetLib/CSM/CSMLoader.cpp. The manipulation leads to heap-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The patch is named 2690e354da0c681db000cfd892a55226788f2743. It is recommended to apply a patch to fix this issue." }, { "lang": "de", "value": "Eine Schwachstelle wurde in Open Asset Import Library Assimp 5.4.3 entdeckt. Sie wurde als kritisch eingestuft. Davon betroffen ist die Funktion CSMImporter::InternReadFile der Datei code/AssetLib/CSM/CSMLoader.cpp. Dank der Manipulation mit unbekannten Daten kann eine heap-based buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung. Der Patch wird als 2690e354da0c681db000cfd892a55226788f2743 bezeichnet. Als bestm\u00f6gliche Massnahme wird Patching empfohlen." } ], "metrics": [ { "cvssV4_0": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-119", "description": "Memory Corruption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-21T14:00:18.480Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-300575 | Open Asset Import Library Assimp CSMLoader.cpp InternReadFile heap-based overflow", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.300575" }, { "name": "VDB-300575 | CTI Indicators (IOB, IOC, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.300575" }, { "name": "Submit #517782 | Open Asset Import Library Assimp \u003e=5.4.3 Heap-based Buffer Overflow", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.517782" }, { "tags": [ "issue-tracking" ], "url": "https://github.com/assimp/assimp/issues/6010" }, { "tags": [ "issue-tracking" ], "url": "https://github.com/assimp/assimp/pull/6052" }, { "tags": [ "exploit", "issue-tracking" ], "url": "https://github.com/assimp/assimp/issues/6010#issue-2877368110" }, { "tags": [ "patch" ], "url": "https://github.com/assimp/assimp/commit/2690e354da0c681db000cfd892a55226788f2743" } ], "timeline": [ { "lang": "en", "time": "2025-03-21T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-03-21T01:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-03-21T08:18:04.000Z", "value": "VulDB entry last update" } ], "title": "Open Asset Import Library Assimp CSMLoader.cpp InternReadFile heap-based overflow" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-2592", "datePublished": "2025-03-21T14:00:18.480Z", "dateReserved": "2025-03-21T07:13:01.316Z", "dateUpdated": "2025-03-21T14:25:58.496Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-2754
Vulnerability from cvelistv5
Published
2025-03-25 08:31
Modified
2025-03-25 13:13
Severity ?
5.3 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
6.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
6.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
6.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
6.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
EPSS score ?
Summary
Open Asset Import Library Assimp AC3D File ACLoader.cpp ConvertObjectSection heap-based overflow
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.300859 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.300859 | signature, permissions-required | |
https://vuldb.com/?submit.517788 | third-party-advisory | |
https://github.com/assimp/assimp/issues/6015 | issue-tracking | |
https://github.com/assimp/assimp/issues/6015#issue-2877373501 | exploit, issue-tracking |
Impacted products
▼ | Vendor | Product |
---|---|---|
Open Asset Import Library | Assimp |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-2754", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-25T13:13:07.129143Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-25T13:13:20.540Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "modules": [ "AC3D File Handler" ], "product": "Assimp", "vendor": "Open Asset Import Library", "versions": [ { "status": "affected", "version": "5.4.3" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "d3ng03 (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Open Asset Import Library Assimp 5.4.3. It has been declared as critical. Affected by this vulnerability is the function Assimp::AC3DImporter::ConvertObjectSection of the file code/AssetLib/AC/ACLoader.cpp of the component AC3D File Handler. The manipulation of the argument it leads to heap-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." }, { "lang": "de", "value": "In Open Asset Import Library Assimp 5.4.3 wurde eine kritische Schwachstelle ausgemacht. Hierbei betrifft es die Funktion Assimp::AC3DImporter::ConvertObjectSection der Datei code/AssetLib/AC/ACLoader.cpp der Komponente AC3D File Handler. Durch das Beeinflussen des Arguments it mit unbekannten Daten kann eine heap-based buffer overflow-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-119", "description": "Memory Corruption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-25T08:31:07.954Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-300859 | Open Asset Import Library Assimp AC3D File ACLoader.cpp ConvertObjectSection heap-based overflow", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.300859" }, { "name": "VDB-300859 | CTI Indicators (IOB, IOC, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.300859" }, { "name": "Submit #517788 | Open Asset Import Library Assimp \u003e=5.4.3 Heap-based Buffer Overflow", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.517788" }, { "tags": [ "issue-tracking" ], "url": "https://github.com/assimp/assimp/issues/6015" }, { "tags": [ "exploit", "issue-tracking" ], "url": "https://github.com/assimp/assimp/issues/6015#issue-2877373501" } ], "timeline": [ { "lang": "en", "time": "2025-03-24T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-03-24T01:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-03-24T17:54:14.000Z", "value": "VulDB entry last update" } ], "title": "Open Asset Import Library Assimp AC3D File ACLoader.cpp ConvertObjectSection heap-based overflow" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-2754", "datePublished": "2025-03-25T08:31:07.954Z", "dateReserved": "2025-03-24T16:47:28.838Z", "dateUpdated": "2025-03-25T13:13:20.540Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-5203
Vulnerability from cvelistv5
Published
2025-05-26 20:00
Modified
2025-05-28 17:34
Severity ?
4.8 (Medium) - CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
3.3 (Low) - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
3.3 (Low) - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
EPSS score ?
Summary
Open Asset Import Library Assimp ParsingUtils.h SkipSpaces out-of-bounds
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.310292 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.310292 | signature, permissions-required | |
https://vuldb.com/?submit.578012 | third-party-advisory | |
https://github.com/assimp/assimp/issues/6175 | issue-tracking | |
https://github.com/assimp/assimp/issues/6128 | issue-tracking | |
https://github.com/user-attachments/files/20209469/reproducer.zip | exploit |
Impacted products
▼ | Vendor | Product |
---|---|---|
Open Asset Import Library | Assimp |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-5203", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-27T14:17:40.831554Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-28T17:34:50.134Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://github.com/assimp/assimp/issues/6175" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Assimp", "vendor": "Open Asset Import Library", "versions": [ { "status": "affected", "version": "5.4.3" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Open Asset Import Library Assimp 5.4.3. It has been rated as problematic. Affected by this issue is the function SkipSpaces in the library assimp/include/assimp/ParsingUtils.h. The manipulation leads to out-of-bounds read. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The project decided to collect all Fuzzer bugs in a main-issue to address them in the future." }, { "lang": "de", "value": "Eine problematische Schwachstelle wurde in Open Asset Import Library Assimp 5.4.3 ausgemacht. Dies betrifft die Funktion SkipSpaces in der Bibliothek assimp/include/assimp/ParsingUtils.h. Durch Manipulation mit unbekannten Daten kann eine out-of-bounds read-Schwachstelle ausgenutzt werden. Der Angriff muss lokal passieren. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 1.7, "vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-Bounds Read", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-119", "description": "Memory Corruption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-26T20:00:09.448Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-310292 | Open Asset Import Library Assimp ParsingUtils.h SkipSpaces out-of-bounds", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.310292" }, { "name": "VDB-310292 | CTI Indicators (IOB, IOC, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.310292" }, { "name": "Submit #578012 | Open Asset Import Library Assimp 5.4.3 Heap Out of Bounds Read", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.578012" }, { "tags": [ "issue-tracking" ], "url": "https://github.com/assimp/assimp/issues/6175" }, { "tags": [ "issue-tracking" ], "url": "https://github.com/assimp/assimp/issues/6128" }, { "tags": [ "exploit" ], "url": "https://github.com/user-attachments/files/20209469/reproducer.zip" } ], "timeline": [ { "lang": "en", "time": "2025-05-26T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-05-26T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-05-26T15:08:50.000Z", "value": "VulDB entry last update" } ], "title": "Open Asset Import Library Assimp ParsingUtils.h SkipSpaces out-of-bounds" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-5203", "datePublished": "2025-05-26T20:00:09.448Z", "dateReserved": "2025-05-26T13:03:37.442Z", "dateUpdated": "2025-05-28T17:34:50.134Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-2591
Vulnerability from cvelistv5
Published
2025-03-21 13:31
Modified
2025-03-21 14:26
Severity ?
5.3 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
4.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
4.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
EPSS score ?
Summary
Open Asset Import Library Assimp MDLLoader.cpp InternReadFile_Quake1 divide by zero
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.300574 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.300574 | signature, permissions-required | |
https://vuldb.com/?submit.517781 | third-party-advisory | |
https://github.com/assimp/assimp/issues/6009 | issue-tracking | |
https://github.com/assimp/assimp/pull/6047 | issue-tracking | |
https://github.com/assimp/assimp/issues/6009#issue-2877367021 | exploit, issue-tracking | |
https://github.com/assimp/assimp/pull/6047/commits/ab66a1674fcfac87aaba4c8b900b315ebc3e7dbd | issue-tracking, patch |
Impacted products
▼ | Vendor | Product |
---|---|---|
Open Asset Import Library | Assimp |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-2591", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-21T14:26:18.342143Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-21T14:26:30.345Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Assimp", "vendor": "Open Asset Import Library", "versions": [ { "status": "affected", "version": "5.4.3" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "d3ng03 (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic was found in Open Asset Import Library Assimp 5.4.3. This vulnerability affects the function MDLImporter::InternReadFile_Quake1 of the file code/AssetLib/MDL/MDLLoader.cpp. The manipulation of the argument skinwidth/skinheight leads to divide by zero. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The patch is identified as ab66a1674fcfac87aaba4c8b900b315ebc3e7dbd. It is recommended to apply a patch to fix this issue." }, { "lang": "de", "value": "In Open Asset Import Library Assimp 5.4.3 wurde eine Schwachstelle entdeckt. Sie wurde als problematisch eingestuft. Hierbei betrifft es die Funktion MDLImporter::InternReadFile_Quake1 der Datei code/AssetLib/MDL/MDLLoader.cpp. Durch Beeinflussen des Arguments skinwidth/skinheight mit unbekannten Daten kann eine divide by zero-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung. Der Patch wird als ab66a1674fcfac87aaba4c8b900b315ebc3e7dbd bezeichnet. Als bestm\u00f6gliche Massnahme wird Patching empfohlen." } ], "metrics": [ { "cvssV4_0": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 5, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-369", "description": "Divide By Zero", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-404", "description": "Denial of Service", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-21T13:31:08.439Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-300574 | Open Asset Import Library Assimp MDLLoader.cpp InternReadFile_Quake1 divide by zero", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.300574" }, { "name": "VDB-300574 | CTI Indicators (IOB, IOC, TTP, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.300574" }, { "name": "Submit #517781 | Open Asset Import Library Assimp \u003e=5.4.3 Divide By Zero", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.517781" }, { "tags": [ "issue-tracking" ], "url": "https://github.com/assimp/assimp/issues/6009" }, { "tags": [ "issue-tracking" ], "url": "https://github.com/assimp/assimp/pull/6047" }, { "tags": [ "exploit", "issue-tracking" ], "url": "https://github.com/assimp/assimp/issues/6009#issue-2877367021" }, { "tags": [ "issue-tracking", "patch" ], "url": "https://github.com/assimp/assimp/pull/6047/commits/ab66a1674fcfac87aaba4c8b900b315ebc3e7dbd" } ], "timeline": [ { "lang": "en", "time": "2025-03-21T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-03-21T01:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-03-21T08:17:57.000Z", "value": "VulDB entry last update" } ], "title": "Open Asset Import Library Assimp MDLLoader.cpp InternReadFile_Quake1 divide by zero" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-2591", "datePublished": "2025-03-21T13:31:08.439Z", "dateReserved": "2025-03-21T06:44:22.518Z", "dateUpdated": "2025-03-21T14:26:30.345Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-2751
Vulnerability from cvelistv5
Published
2025-03-25 07:31
Modified
2025-03-31 17:34
Severity ?
5.3 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
4.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
4.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
EPSS score ?
Summary
Open Asset Import Library Assimp CSM File CSMLoader.cpp InternReadFile out-of-bounds
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.300856 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.300856 | signature, permissions-required | |
https://vuldb.com/?submit.517785 | third-party-advisory | |
https://github.com/assimp/assimp/issues/6012 | issue-tracking | |
https://github.com/assimp/assimp/issues/6012#issue-2877369817 | exploit, issue-tracking |
Impacted products
▼ | Vendor | Product |
---|---|---|
Open Asset Import Library | Assimp |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-2751", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-31T17:34:28.243576Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-31T17:34:52.202Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "modules": [ "CSM File Handler" ], "product": "Assimp", "vendor": "Open Asset Import Library", "versions": [ { "status": "affected", "version": "5.4.3" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "d3ng03 (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in Open Asset Import Library Assimp 5.4.3 and classified as problematic. This vulnerability affects the function Assimp::CSMImporter::InternReadFile of the file code/AssetLib/CSM/CSMLoader.cpp of the component CSM File Handler. The manipulation of the argument na leads to out-of-bounds read. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." }, { "lang": "de", "value": "In Open Asset Import Library Assimp 5.4.3 wurde eine problematische Schwachstelle gefunden. Das betrifft die Funktion Assimp::CSMImporter::InternReadFile der Datei code/AssetLib/CSM/CSMLoader.cpp der Komponente CSM File Handler. Mittels Manipulieren des Arguments na mit unbekannten Daten kann eine out-of-bounds read-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk angegangen werden. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 5, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-Bounds Read", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-119", "description": "Memory Corruption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-25T07:31:05.393Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-300856 | Open Asset Import Library Assimp CSM File CSMLoader.cpp InternReadFile out-of-bounds", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.300856" }, { "name": "VDB-300856 | CTI Indicators (IOB, IOC, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.300856" }, { "name": "Submit #517785 | Open Asset Import Library Assimp \u003e=5.4.3 Out-of-Bounds Read", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.517785" }, { "tags": [ "issue-tracking" ], "url": "https://github.com/assimp/assimp/issues/6012" }, { "tags": [ "exploit", "issue-tracking" ], "url": "https://github.com/assimp/assimp/issues/6012#issue-2877369817" } ], "timeline": [ { "lang": "en", "time": "2025-03-24T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-03-24T01:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-03-24T17:54:09.000Z", "value": "VulDB entry last update" } ], "title": "Open Asset Import Library Assimp CSM File CSMLoader.cpp InternReadFile out-of-bounds" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-2751", "datePublished": "2025-03-25T07:31:05.393Z", "dateReserved": "2025-03-24T16:47:20.226Z", "dateUpdated": "2025-03-31T17:34:52.202Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-2757
Vulnerability from cvelistv5
Published
2025-03-25 09:31
Modified
2025-03-31 16:25
Severity ?
5.3 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
6.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
6.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
6.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
6.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
EPSS score ?
Summary
Open Asset Import Library Assimp MD5 File MD5Parser.cpp AI_MD5_PARSE_STRING_IN_QUOTATION heap-based overflow
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.300862 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.300862 | signature, permissions-required | |
https://vuldb.com/?submit.517817 | third-party-advisory | |
https://github.com/assimp/assimp/issues/6019 | issue-tracking | |
https://github.com/assimp/assimp/issues/6019#issue-2877376386 | exploit, issue-tracking |
Impacted products
▼ | Vendor | Product |
---|---|---|
Open Asset Import Library | Assimp |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-2757", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-31T16:25:33.708583Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-31T16:25:42.302Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "modules": [ "MD5 File Handler" ], "product": "Assimp", "vendor": "Open Asset Import Library", "versions": [ { "status": "affected", "version": "5.4.3" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "d3ng03 (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in Open Asset Import Library Assimp 5.4.3. This vulnerability affects the function AI_MD5_PARSE_STRING_IN_QUOTATION of the file code/AssetLib/MD5/MD5Parser.cpp of the component MD5 File Handler. The manipulation of the argument data leads to heap-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." }, { "lang": "de", "value": "In Open Asset Import Library Assimp 5.4.3 wurde eine Schwachstelle entdeckt. Sie wurde als kritisch eingestuft. Betroffen ist die Funktion AI_MD5_PARSE_STRING_IN_QUOTATION der Datei code/AssetLib/MD5/MD5Parser.cpp der Komponente MD5 File Handler. Dank Manipulation des Arguments data mit unbekannten Daten kann eine heap-based buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk passieren. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-119", "description": "Memory Corruption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-25T09:31:06.160Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-300862 | Open Asset Import Library Assimp MD5 File MD5Parser.cpp AI_MD5_PARSE_STRING_IN_QUOTATION heap-based overflow", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.300862" }, { "name": "VDB-300862 | CTI Indicators (IOB, IOC, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.300862" }, { "name": "Submit #517817 | Open Asset Import Library Assimp \u003e=5.4.3 Heap-based Buffer Overflow", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.517817" }, { "tags": [ "issue-tracking" ], "url": "https://github.com/assimp/assimp/issues/6019" }, { "tags": [ "exploit", "issue-tracking" ], "url": "https://github.com/assimp/assimp/issues/6019#issue-2877376386" } ], "timeline": [ { "lang": "en", "time": "2025-03-24T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-03-24T01:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-03-24T17:54:18.000Z", "value": "VulDB entry last update" } ], "title": "Open Asset Import Library Assimp MD5 File MD5Parser.cpp AI_MD5_PARSE_STRING_IN_QUOTATION heap-based overflow" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-2757", "datePublished": "2025-03-25T09:31:06.160Z", "dateReserved": "2025-03-24T16:47:37.426Z", "dateUpdated": "2025-03-31T16:25:42.302Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-40724
Vulnerability from cvelistv5
Published
2024-07-19 07:38
Modified
2025-03-25 13:27
Severity ?
EPSS score ?
Summary
Heap-based buffer overflow vulnerability in Assimp versions prior to 5.4.2 allows a local attacker to execute arbitrary code by inputting a specially crafted file into the product.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Open Asset Import Library | Assimp |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:open_asset_import_library:open_asset_import_library:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "open_asset_import_library", "vendor": "open_asset_import_library", "versions": [ { "lessThan": "5.4.2", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-40724", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-19T14:51:24.865191Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-25T13:27:33.147Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T04:33:11.893Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/assimp/assimp/releases/tag/v5.4.2" }, { "tags": [ "x_transferred" ], "url": "https://github.com/assimp/assimp/pull/5651/commits/614911bb3b1bfc3a1799ae2b3cca306270f3fb97" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN87710540/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Assimp", "vendor": "Open Asset Import Library", "versions": [ { "status": "affected", "version": "prior to 5.4.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow vulnerability in Assimp versions prior to 5.4.2 allows a local attacker to execute arbitrary code by inputting a specially crafted file into the product." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap-based buffer overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-19T07:38:28.057Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://github.com/assimp/assimp/releases/tag/v5.4.2" }, { "url": "https://github.com/assimp/assimp/pull/5651/commits/614911bb3b1bfc3a1799ae2b3cca306270f3fb97" }, { "url": "https://jvn.jp/en/jp/JVN87710540/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2024-40724", "datePublished": "2024-07-19T07:38:28.057Z", "dateReserved": "2024-07-09T06:39:54.634Z", "dateUpdated": "2025-03-25T13:27:33.147Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-3159
Vulnerability from cvelistv5
Published
2025-04-03 14:00
Modified
2025-04-03 14:42
Severity ?
4.8 (Medium) - CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
5.3 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
5.3 (Medium) - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
5.3 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
5.3 (Medium) - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
EPSS score ?
Summary
Open Asset Import Library Assimp ASE File ASEParser.cpp ParseLV4MeshBonesVertices heap-based overflow
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.303105 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.303105 | signature, permissions-required | |
https://vuldb.com/?submit.542247 | third-party-advisory | |
https://github.com/assimp/assimp/issues/6024 | issue-tracking | |
https://github.com/assimp/assimp/pull/6051 | issue-tracking | |
https://github.com/assimp/assimp/issues/6024#issue-2877382033 | exploit, issue-tracking | |
https://github.com/tellypresence/assimp/commit/e8a6286542924e628e02749c4f5ac4f91fdae71b | patch |
Impacted products
▼ | Vendor | Product |
---|---|---|
Open Asset Import Library | Assimp |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-3159", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-03T14:40:59.796420Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-03T14:42:22.402Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "modules": [ "ASE File Handler" ], "product": "Assimp", "vendor": "Open Asset Import Library", "versions": [ { "status": "affected", "version": "5.4.3" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "d3ng03 (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in Open Asset Import Library Assimp 5.4.3. This affects the function Assimp::ASE::Parser::ParseLV4MeshBonesVertices of the file code/AssetLib/ASE/ASEParser.cpp of the component ASE File Handler. The manipulation leads to heap-based buffer overflow. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The identifier of the patch is e8a6286542924e628e02749c4f5ac4f91fdae71b. It is recommended to apply a patch to fix this issue." }, { "lang": "de", "value": "Es wurde eine kritische Schwachstelle in Open Asset Import Library Assimp 5.4.3 gefunden. Es betrifft die Funktion Assimp::ASE::Parser::ParseLV4MeshBonesVertices der Datei code/AssetLib/ASE/ASEParser.cpp der Komponente ASE File Handler. Dank der Manipulation mit unbekannten Daten kann eine heap-based buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff muss lokal erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung. Der Patch wird als e8a6286542924e628e02749c4f5ac4f91fdae71b bezeichnet. Als bestm\u00f6gliche Massnahme wird Patching empfohlen." } ], "metrics": [ { "cvssV4_0": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 4.3, "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-119", "description": "Memory Corruption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-03T14:00:17.038Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-303105 | Open Asset Import Library Assimp ASE File ASEParser.cpp ParseLV4MeshBonesVertices heap-based overflow", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.303105" }, { "name": "VDB-303105 | CTI Indicators (IOB, IOC, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.303105" }, { "name": "Submit #542247 | Open Asset Import Library Assimp \u003e=5.4.3 Heap-based Buffer Overflow", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.542247" }, { "tags": [ "issue-tracking" ], "url": "https://github.com/assimp/assimp/issues/6024" }, { "tags": [ "issue-tracking" ], "url": "https://github.com/assimp/assimp/pull/6051" }, { "tags": [ "exploit", "issue-tracking" ], "url": "https://github.com/assimp/assimp/issues/6024#issue-2877382033" }, { "tags": [ "patch" ], "url": "https://github.com/tellypresence/assimp/commit/e8a6286542924e628e02749c4f5ac4f91fdae71b" } ], "timeline": [ { "lang": "en", "time": "2025-04-03T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-04-03T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-04-03T08:59:25.000Z", "value": "VulDB entry last update" } ], "title": "Open Asset Import Library Assimp ASE File ASEParser.cpp ParseLV4MeshBonesVertices heap-based overflow" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-3159", "datePublished": "2025-04-03T14:00:17.038Z", "dateReserved": "2025-04-03T06:54:12.803Z", "dateUpdated": "2025-04-03T14:42:22.402Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-2755
Vulnerability from cvelistv5
Published
2025-03-25 09:00
Modified
2025-03-31 16:30
Severity ?
5.3 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
6.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
6.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
6.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
6.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
EPSS score ?
Summary
Open Asset Import Library Assimp AC3D File ACLoader.cpp ConvertObjectSection out-of-bounds
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.300860 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.300860 | signature, permissions-required | |
https://vuldb.com/?submit.517789 | third-party-advisory | |
https://github.com/assimp/assimp/issues/6017 | issue-tracking | |
https://github.com/assimp/assimp/issues/6017#issue-2877374161 | exploit, issue-tracking |
Impacted products
▼ | Vendor | Product |
---|---|---|
Open Asset Import Library | Assimp |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-2755", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-31T16:29:58.121454Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-31T16:30:11.979Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "modules": [ "AC3D File Handler" ], "product": "Assimp", "vendor": "Open Asset Import Library", "versions": [ { "status": "affected", "version": "5.4.3" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "d3ng03 (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Open Asset Import Library Assimp 5.4.3. It has been rated as critical. Affected by this issue is the function Assimp::AC3DImporter::ConvertObjectSection of the file code/AssetLib/AC/ACLoader.cpp of the component AC3D File Handler. The manipulation of the argument src.entries leads to out-of-bounds read. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." }, { "lang": "de", "value": "Eine kritische Schwachstelle wurde in Open Asset Import Library Assimp 5.4.3 ausgemacht. Davon betroffen ist die Funktion Assimp::AC3DImporter::ConvertObjectSection der Datei code/AssetLib/AC/ACLoader.cpp der Komponente AC3D File Handler. Durch Beeinflussen des Arguments src.entries mit unbekannten Daten kann eine out-of-bounds read-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-Bounds Read", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-119", "description": "Memory Corruption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-25T09:00:10.018Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-300860 | Open Asset Import Library Assimp AC3D File ACLoader.cpp ConvertObjectSection out-of-bounds", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.300860" }, { "name": "VDB-300860 | CTI Indicators (IOB, IOC, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.300860" }, { "name": "Submit #517789 | Open Asset Import Library Assimp \u003e=5.4.3 Out-of-Bounds Read", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.517789" }, { "tags": [ "issue-tracking" ], "url": "https://github.com/assimp/assimp/issues/6017" }, { "tags": [ "exploit", "issue-tracking" ], "url": "https://github.com/assimp/assimp/issues/6017#issue-2877374161" } ], "timeline": [ { "lang": "en", "time": "2025-03-24T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-03-24T01:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-03-24T17:54:15.000Z", "value": "VulDB entry last update" } ], "title": "Open Asset Import Library Assimp AC3D File ACLoader.cpp ConvertObjectSection out-of-bounds" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-2755", "datePublished": "2025-03-25T09:00:10.018Z", "dateReserved": "2025-03-24T16:47:31.743Z", "dateUpdated": "2025-03-31T16:30:11.979Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-2752
Vulnerability from cvelistv5
Published
2025-03-25 08:00
Modified
2025-03-31 17:27
Severity ?
5.3 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
4.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
4.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
EPSS score ?
Summary
Open Asset Import Library Assimp CSM File fast_atof.h fast_atoreal_move out-of-bounds
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.300857 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.300857 | signature, permissions-required | |
https://vuldb.com/?submit.517786 | third-party-advisory | |
https://github.com/assimp/assimp/issues/6013 | issue-tracking | |
https://github.com/assimp/assimp/issues/6013#issue-2877371176 | exploit, issue-tracking |
Impacted products
▼ | Vendor | Product |
---|---|---|
Open Asset Import Library | Assimp |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-2752", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-31T17:26:49.207580Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-31T17:27:11.090Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "modules": [ "CSM File Handler" ], "product": "Assimp", "vendor": "Open Asset Import Library", "versions": [ { "status": "affected", "version": "5.4.3" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "d3ng03 (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Open Asset Import Library Assimp 5.4.3 and classified as problematic. This issue affects the function fast_atoreal_move in the library include/assimp/fast_atof.h of the component CSM File Handler. The manipulation leads to out-of-bounds read. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." }, { "lang": "de", "value": "Eine problematische Schwachstelle wurde in Open Asset Import Library Assimp 5.4.3 gefunden. Dies betrifft die Funktion fast_atoreal_move in der Bibliothek include/assimp/fast_atof.h der Komponente CSM File Handler. Durch das Manipulieren mit unbekannten Daten kann eine out-of-bounds read-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk passieren. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 5, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-Bounds Read", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-119", "description": "Memory Corruption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-25T08:00:11.272Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-300857 | Open Asset Import Library Assimp CSM File fast_atof.h fast_atoreal_move out-of-bounds", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.300857" }, { "name": "VDB-300857 | CTI Indicators (IOB, IOC, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.300857" }, { "name": "Submit #517786 | Open Asset Import Library Assimp \u003e=5.4.3 Out-of-Bounds Read", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.517786" }, { "tags": [ "issue-tracking" ], "url": "https://github.com/assimp/assimp/issues/6013" }, { "tags": [ "exploit", "issue-tracking" ], "url": "https://github.com/assimp/assimp/issues/6013#issue-2877371176" } ], "timeline": [ { "lang": "en", "time": "2025-03-24T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-03-24T01:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-03-24T17:54:11.000Z", "value": "VulDB entry last update" } ], "title": "Open Asset Import Library Assimp CSM File fast_atof.h fast_atoreal_move out-of-bounds" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-2752", "datePublished": "2025-03-25T08:00:11.272Z", "dateReserved": "2025-03-24T16:47:23.145Z", "dateUpdated": "2025-03-31T17:27:11.090Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-2753
Vulnerability from cvelistv5
Published
2025-03-25 08:31
Modified
2025-03-25 13:14
Severity ?
5.3 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
6.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
6.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
6.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
6.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
EPSS score ?
Summary
Open Asset Import Library Assimp LWS File LWSLoader.cpp MergeScenes out-of-bounds
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.300858 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.300858 | signature, permissions-required | |
https://vuldb.com/?submit.517787 | third-party-advisory | |
https://github.com/assimp/assimp/issues/6014 | issue-tracking | |
https://github.com/assimp/assimp/issues/6014#issue-2877372462 | exploit, issue-tracking |
Impacted products
▼ | Vendor | Product |
---|---|---|
Open Asset Import Library | Assimp |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-2753", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-25T13:14:44.931857Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-25T13:14:56.061Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "modules": [ "LWS File Handler" ], "product": "Assimp", "vendor": "Open Asset Import Library", "versions": [ { "status": "affected", "version": "5.4.3" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "d3ng03 (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Open Asset Import Library Assimp 5.4.3. It has been classified as critical. Affected is the function SceneCombiner::MergeScenes of the file code/AssetLib/LWS/LWSLoader.cpp of the component LWS File Handler. The manipulation leads to out-of-bounds read. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." }, { "lang": "de", "value": "Es wurde eine kritische Schwachstelle in Open Asset Import Library Assimp 5.4.3 ausgemacht. Dabei betrifft es die Funktion SceneCombiner::MergeScenes der Datei code/AssetLib/LWS/LWSLoader.cpp der Komponente LWS File Handler. Durch Manipulieren mit unbekannten Daten kann eine out-of-bounds read-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-Bounds Read", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-119", "description": "Memory Corruption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-25T08:31:04.517Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-300858 | Open Asset Import Library Assimp LWS File LWSLoader.cpp MergeScenes out-of-bounds", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.300858" }, { "name": "VDB-300858 | CTI Indicators (IOB, IOC, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.300858" }, { "name": "Submit #517787 | Open Asset Import Library Assimp \u003e=5.4.3 Out-of-Bounds Read", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.517787" }, { "tags": [ "issue-tracking" ], "url": "https://github.com/assimp/assimp/issues/6014" }, { "tags": [ "exploit", "issue-tracking" ], "url": "https://github.com/assimp/assimp/issues/6014#issue-2877372462" } ], "timeline": [ { "lang": "en", "time": "2025-03-24T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-03-24T01:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-03-24T17:54:13.000Z", "value": "VulDB entry last update" } ], "title": "Open Asset Import Library Assimp LWS File LWSLoader.cpp MergeScenes out-of-bounds" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-2753", "datePublished": "2025-03-25T08:31:04.517Z", "dateReserved": "2025-03-24T16:47:26.013Z", "dateUpdated": "2025-03-25T13:14:56.061Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-5200
Vulnerability from cvelistv5
Published
2025-05-26 18:31
Modified
2025-05-28 17:35
Severity ?
4.8 (Medium) - CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
3.3 (Low) - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
3.3 (Low) - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
EPSS score ?
Summary
Open Asset Import Library Assimp MDLLoader.cpp InternReadFile_Quake1 out-of-bounds
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.310289 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.310289 | signature, permissions-required | |
https://vuldb.com/?submit.578005 | third-party-advisory | |
https://github.com/assimp/assimp/issues/6172 | issue-tracking | |
https://github.com/assimp/assimp/issues/6128 | issue-tracking | |
https://github.com/user-attachments/files/20208985/line-452-reproducer.zip | exploit |
Impacted products
▼ | Vendor | Product |
---|---|---|
Open Asset Import Library | Assimp |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-5200", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-27T14:17:59.007226Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-28T17:35:08.578Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://github.com/assimp/assimp/issues/6172" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Assimp", "vendor": "Open Asset Import Library", "versions": [ { "status": "affected", "version": "5.4.3" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Open Asset Import Library Assimp 5.4.3 and classified as problematic. This issue affects the function MDLImporter::InternReadFile_Quake1 of the file assimp/code/AssetLib/MDL/MDLLoader.cpp. The manipulation leads to out-of-bounds read. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The project decided to collect all Fuzzer bugs in a main-issue to address them in the future." }, { "lang": "de", "value": "Eine problematische Schwachstelle wurde in Open Asset Import Library Assimp 5.4.3 gefunden. Hierbei geht es um die Funktion MDLImporter::InternReadFile_Quake1 der Datei assimp/code/AssetLib/MDL/MDLLoader.cpp. Dank Manipulation mit unbekannten Daten kann eine out-of-bounds read-Schwachstelle ausgenutzt werden. Umgesetzt werden muss der Angriff lokal. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 1.7, "vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-Bounds Read", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-119", "description": "Memory Corruption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-26T18:31:06.626Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-310289 | Open Asset Import Library Assimp MDLLoader.cpp InternReadFile_Quake1 out-of-bounds", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.310289" }, { "name": "VDB-310289 | CTI Indicators (IOB, IOC, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.310289" }, { "name": "Submit #578005 | Open Asset Import Library Assimp 5.4.3 Heap Out of Bounds Read", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.578005" }, { "tags": [ "issue-tracking" ], "url": "https://github.com/assimp/assimp/issues/6172" }, { "tags": [ "issue-tracking" ], "url": "https://github.com/assimp/assimp/issues/6128" }, { "tags": [ "exploit" ], "url": "https://github.com/user-attachments/files/20208985/line-452-reproducer.zip" } ], "timeline": [ { "lang": "en", "time": "2025-05-26T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-05-26T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-05-26T15:08:46.000Z", "value": "VulDB entry last update" } ], "title": "Open Asset Import Library Assimp MDLLoader.cpp InternReadFile_Quake1 out-of-bounds" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-5200", "datePublished": "2025-05-26T18:31:06.626Z", "dateReserved": "2025-05-26T13:03:25.838Z", "dateUpdated": "2025-05-28T17:35:08.578Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-5201
Vulnerability from cvelistv5
Published
2025-05-26 19:00
Modified
2025-05-28 17:35
Severity ?
4.8 (Medium) - CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
3.3 (Low) - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
3.3 (Low) - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
EPSS score ?
Summary
Open Asset Import Library Assimp LWOLoader.cpp CountVertsAndFacesLWO2 out-of-bounds
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.310290 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.310290 | signature, permissions-required | |
https://vuldb.com/?submit.578006 | third-party-advisory | |
https://github.com/assimp/assimp/issues/6173 | issue-tracking | |
https://github.com/assimp/assimp/issues/6128 | issue-tracking | |
https://github.com/user-attachments/files/20209125/line-832-reproducer.zip | exploit |
Impacted products
▼ | Vendor | Product |
---|---|---|
Open Asset Import Library | Assimp |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-5201", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-27T14:17:52.028954Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-28T17:35:01.372Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://github.com/assimp/assimp/issues/6174" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Assimp", "vendor": "Open Asset Import Library", "versions": [ { "status": "affected", "version": "5.4.3" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Open Asset Import Library Assimp 5.4.3. It has been classified as problematic. Affected is the function LWOImporter::CountVertsAndFacesLWO2 of the file assimp/code/AssetLib/LWO/LWOLoader.cpp. The manipulation leads to out-of-bounds read. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The project decided to collect all Fuzzer bugs in a main-issue to address them in the future." }, { "lang": "de", "value": "Es wurde eine problematische Schwachstelle in Open Asset Import Library Assimp 5.4.3 ausgemacht. Es betrifft die Funktion LWOImporter::CountVertsAndFacesLWO2 der Datei assimp/code/AssetLib/LWO/LWOLoader.cpp. Mit der Manipulation mit unbekannten Daten kann eine out-of-bounds read-Schwachstelle ausgenutzt werden. Der Angriff hat dabei lokal zu erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 1.7, "vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-Bounds Read", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-119", "description": "Memory Corruption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-26T19:00:09.982Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-310290 | Open Asset Import Library Assimp LWOLoader.cpp CountVertsAndFacesLWO2 out-of-bounds", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.310290" }, { "name": "VDB-310290 | CTI Indicators (IOB, IOC, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.310290" }, { "name": "Submit #578006 | Open Asset Import Library Assimp 5.4.3 Heap Out of Bounds Read", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.578006" }, { "tags": [ "issue-tracking" ], "url": "https://github.com/assimp/assimp/issues/6173" }, { "tags": [ "issue-tracking" ], "url": "https://github.com/assimp/assimp/issues/6128" }, { "tags": [ "exploit" ], "url": "https://github.com/user-attachments/files/20209125/line-832-reproducer.zip" } ], "timeline": [ { "lang": "en", "time": "2025-05-26T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-05-26T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-05-26T15:08:47.000Z", "value": "VulDB entry last update" } ], "title": "Open Asset Import Library Assimp LWOLoader.cpp CountVertsAndFacesLWO2 out-of-bounds" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-5201", "datePublished": "2025-05-26T19:00:09.982Z", "dateReserved": "2025-05-26T13:03:32.375Z", "dateUpdated": "2025-05-28T17:35:01.372Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-3015
Vulnerability from cvelistv5
Published
2025-03-31 20:31
Modified
2025-03-31 21:21
Severity ?
5.3 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
6.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
6.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
6.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
6.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
EPSS score ?
Summary
Open Asset Import Library Assimp ASE File ASELoader.cpp BuildUniqueRepresentation out-of-bounds
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.302067 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.302067 | signature, permissions-required | |
https://vuldb.com/?submit.524589 | third-party-advisory | |
https://github.com/assimp/assimp/issues/6021 | issue-tracking | |
https://github.com/assimp/assimp/pull/6045 | issue-tracking | |
https://github.com/assimp/assimp/issues/6021#issue-2877378829 | exploit, issue-tracking | |
https://github.com/assimp/assimp/commit/7c705fde418d68cca4e8eff56be01b2617b0d6fe | patch |
Impacted products
▼ | Vendor | Product |
---|---|---|
Open Asset Import Library | Assimp |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-3015", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-31T21:20:52.272522Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-31T21:21:09.096Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://github.com/assimp/assimp/issues/6021" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "modules": [ "ASE File Handler" ], "product": "Assimp", "vendor": "Open Asset Import Library", "versions": [ { "status": "affected", "version": "5.4.3" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "d3ng03 (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in Open Asset Import Library Assimp 5.4.3. This affects the function Assimp::ASEImporter::BuildUniqueRepresentation of the file code/AssetLib/ASE/ASELoader.cpp of the component ASE File Handler. The manipulation of the argument mIndices leads to out-of-bounds read. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 6.0 is able to address this issue. The patch is named 7c705fde418d68cca4e8eff56be01b2617b0d6fe. It is recommended to apply a patch to fix this issue." }, { "lang": "de", "value": "Es wurde eine Schwachstelle in Open Asset Import Library Assimp 5.4.3 entdeckt. Sie wurde als kritisch eingestuft. Es geht dabei um die Funktion Assimp::ASEImporter::BuildUniqueRepresentation der Datei code/AssetLib/ASE/ASELoader.cpp der Komponente ASE File Handler. Durch das Manipulieren des Arguments mIndices mit unbekannten Daten kann eine out-of-bounds read-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk passieren. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung. Ein Aktualisieren auf die Version 6.0 vermag dieses Problem zu l\u00f6sen. Der Patch wird als 7c705fde418d68cca4e8eff56be01b2617b0d6fe bezeichnet. Als bestm\u00f6gliche Massnahme wird Patching empfohlen." } ], "metrics": [ { "cvssV4_0": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-Bounds Read", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-119", "description": "Memory Corruption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-31T20:31:06.477Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-302067 | Open Asset Import Library Assimp ASE File ASELoader.cpp BuildUniqueRepresentation out-of-bounds", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.302067" }, { "name": "VDB-302067 | CTI Indicators (IOB, IOC, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.302067" }, { "name": "Submit #524589 | Open Asset Import Library Assimp \u003e=5.4.3 Out-of-Bounds Read", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.524589" }, { "tags": [ "issue-tracking" ], "url": "https://github.com/assimp/assimp/issues/6021" }, { "tags": [ "issue-tracking" ], "url": "https://github.com/assimp/assimp/pull/6045" }, { "tags": [ "exploit", "issue-tracking" ], "url": "https://github.com/assimp/assimp/issues/6021#issue-2877378829" }, { "tags": [ "patch" ], "url": "https://github.com/assimp/assimp/commit/7c705fde418d68cca4e8eff56be01b2617b0d6fe" } ], "timeline": [ { "lang": "en", "time": "2025-03-31T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-03-31T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-03-31T07:43:00.000Z", "value": "VulDB entry last update" } ], "title": "Open Asset Import Library Assimp ASE File ASELoader.cpp BuildUniqueRepresentation out-of-bounds" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-3015", "datePublished": "2025-03-31T20:31:06.477Z", "dateReserved": "2025-03-31T05:37:55.204Z", "dateUpdated": "2025-03-31T21:21:09.096Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-2151
Vulnerability from cvelistv5
Published
2025-03-10 13:00
Modified
2025-03-21 08:51
Severity ?
5.3 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
6.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
6.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
6.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
6.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
EPSS score ?
Summary
Open Asset Import Library Assimp File ParsingUtils.h GetNextLine stack-based overflow
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.299062 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.299062 | signature, permissions-required | |
https://vuldb.com/?submit.510582 | third-party-advisory | |
https://github.com/assimp/assimp/issues/6016 | issue-tracking | |
https://github.com/assimp/assimp/issues/6026 | issue-tracking | |
https://github.com/sae-as-me/Crashes/raw/refs/heads/main/assimp/assimp_crash_1 | exploit |
Impacted products
▼ | Vendor | Product |
---|---|---|
Open Asset Import Library | Assimp |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-2151", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-10T13:35:23.834146Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-10T13:35:30.577Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://github.com/assimp/assimp/issues/6016" }, { "tags": [ "exploit" ], "url": "https://github.com/assimp/assimp/issues/6026" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "modules": [ "File Handler" ], "product": "Assimp", "vendor": "Open Asset Import Library", "versions": [ { "status": "affected", "version": "5.4.3" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Chen Lihai" }, { "lang": "en", "type": "finder", "value": "Zhang Yuqing" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in Open Asset Import Library Assimp 5.4.3. This vulnerability affects the function Assimp::GetNextLine in the library ParsingUtils.h of the component File Handler. The manipulation leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." }, { "lang": "de", "value": "In Open Asset Import Library Assimp 5.4.3 wurde eine Schwachstelle entdeckt. Sie wurde als kritisch eingestuft. Betroffen ist die Funktion Assimp::GetNextLine in der Bibliothek ParsingUtils.h der Komponente File Handler. Mittels dem Manipulieren mit unbekannten Daten kann eine stack-based buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk passieren. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "Stack-based Buffer Overflow", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-119", "description": "Memory Corruption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-21T08:51:59.842Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-299062 | Open Asset Import Library Assimp File ParsingUtils.h GetNextLine stack-based overflow", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.299062" }, { "name": "VDB-299062 | CTI Indicators (IOB, IOC, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.299062" }, { "name": "Submit #510582 | https://github.com/assimp/assimp assimp v5.4.3 Stack-based Buffer Overflow", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.510582" }, { "tags": [ "issue-tracking" ], "url": "https://github.com/assimp/assimp/issues/6016" }, { "tags": [ "issue-tracking" ], "url": "https://github.com/assimp/assimp/issues/6026" }, { "tags": [ "exploit" ], "url": "https://github.com/sae-as-me/Crashes/raw/refs/heads/main/assimp/assimp_crash_1" } ], "timeline": [ { "lang": "en", "time": "2025-03-10T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-03-10T01:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-03-21T09:53:52.000Z", "value": "VulDB entry last update" } ], "title": "Open Asset Import Library Assimp File ParsingUtils.h GetNextLine stack-based overflow" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-2151", "datePublished": "2025-03-10T13:00:07.622Z", "dateReserved": "2025-03-10T06:23:12.776Z", "dateUpdated": "2025-03-21T08:51:59.842Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-3158
Vulnerability from cvelistv5
Published
2025-04-03 13:31
Modified
2025-04-03 15:28
Severity ?
4.8 (Medium) - CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
5.3 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
5.3 (Medium) - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
5.3 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
5.3 (Medium) - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
EPSS score ?
Summary
Open Asset Import Library Assimp LWO File LWOAnimation.cpp UpdateAnimRangeSetup heap-based overflow
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.303104 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.303104 | signature, permissions-required | |
https://vuldb.com/?submit.542246 | third-party-advisory | |
https://github.com/assimp/assimp/issues/6023 | issue-tracking | |
https://github.com/assimp/assimp/issues/6023#issue-2877381000 | exploit, issue-tracking |
Impacted products
▼ | Vendor | Product |
---|---|---|
Open Asset Import Library | Assimp |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-3158", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-03T15:22:28.971160Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-03T15:28:57.038Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "modules": [ "LWO File Handler" ], "product": "Assimp", "vendor": "Open Asset Import Library", "versions": [ { "status": "affected", "version": "5.4.3" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "d3ng03 (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in Open Asset Import Library Assimp 5.4.3. Affected by this issue is the function Assimp::LWO::AnimResolver::UpdateAnimRangeSetup of the file code/AssetLib/LWO/LWOAnimation.cpp of the component LWO File Handler. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used." }, { "lang": "de", "value": "Eine kritische Schwachstelle wurde in Open Asset Import Library Assimp 5.4.3 entdeckt. Hierbei geht es um die Funktion Assimp::LWO::AnimResolver::UpdateAnimRangeSetup der Datei code/AssetLib/LWO/LWOAnimation.cpp der Komponente LWO File Handler. Durch Beeinflussen mit unbekannten Daten kann eine heap-based buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff muss lokal passieren. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 4.3, "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-119", "description": "Memory Corruption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-03T13:31:06.224Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-303104 | Open Asset Import Library Assimp LWO File LWOAnimation.cpp UpdateAnimRangeSetup heap-based overflow", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.303104" }, { "name": "VDB-303104 | CTI Indicators (IOB, IOC, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.303104" }, { "name": "Submit #542246 | Open Asset Import Library Assimp \u003e=5.4.3 Heap-based Buffer Overflow", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.542246" }, { "tags": [ "issue-tracking" ], "url": "https://github.com/assimp/assimp/issues/6023" }, { "tags": [ "exploit", "issue-tracking" ], "url": "https://github.com/assimp/assimp/issues/6023#issue-2877381000" } ], "timeline": [ { "lang": "en", "time": "2025-04-03T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-04-03T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-04-03T08:59:23.000Z", "value": "VulDB entry last update" } ], "title": "Open Asset Import Library Assimp LWO File LWOAnimation.cpp UpdateAnimRangeSetup heap-based overflow" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-3158", "datePublished": "2025-04-03T13:31:06.224Z", "dateReserved": "2025-04-03T06:54:07.709Z", "dateUpdated": "2025-04-03T15:28:57.038Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-2152
Vulnerability from cvelistv5
Published
2025-03-10 13:31
Modified
2025-05-12 15:35
Severity ?
5.3 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
6.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
6.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
6.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
6.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
EPSS score ?
Summary
Open Asset Import Library Assimp File BaseImporter.cpp ConvertToUTF8 heap-based overflow
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.299063 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.299063 | signature, permissions-required | |
https://vuldb.com/?submit.510818 | third-party-advisory | |
https://github.com/assimp/assimp/issues/6027 | issue-tracking | |
https://github.com/assimp/assimp/issues/6027#issue-2877629241 | exploit, issue-tracking |
Impacted products
▼ | Vendor | Product |
---|---|---|
Open Asset Import Library | Assimp |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-2152", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-10T14:23:55.561657Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-12T15:35:15.861Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "modules": [ "File Handler" ], "product": "Assimp", "vendor": "Open Asset Import Library", "versions": [ { "status": "affected", "version": "5.4.3" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Chen Lihai" }, { "lang": "en", "type": "finder", "value": "Zhang Yuqing" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in Open Asset Import Library Assimp 5.4.3. This issue affects the function Assimp::BaseImporter::ConvertToUTF8 of the file BaseImporter.cpp of the component File Handler. The manipulation leads to heap-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." }, { "lang": "de", "value": "Eine Schwachstelle wurde in Open Asset Import Library Assimp 5.4.3 entdeckt. Sie wurde als kritisch eingestuft. Betroffen davon ist die Funktion Assimp::BaseImporter::ConvertToUTF8 der Datei BaseImporter.cpp der Komponente File Handler. Mittels Manipulieren mit unbekannten Daten kann eine heap-based buffer overflow-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-119", "description": "Memory Corruption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-21T08:52:25.577Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-299063 | Open Asset Import Library Assimp File BaseImporter.cpp ConvertToUTF8 heap-based overflow", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.299063" }, { "name": "VDB-299063 | CTI Indicators (IOB, IOC, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.299063" }, { "name": "Submit #510818 | https://github.com/assimp/assimp assimp v5.4.3 Heap-based Buffer Overflow", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.510818" }, { "tags": [ "issue-tracking" ], "url": "https://github.com/assimp/assimp/issues/6027" }, { "tags": [ "exploit", "issue-tracking" ], "url": "https://github.com/assimp/assimp/issues/6027#issue-2877629241" } ], "timeline": [ { "lang": "en", "time": "2025-03-10T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-03-10T01:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-03-21T09:54:22.000Z", "value": "VulDB entry last update" } ], "title": "Open Asset Import Library Assimp File BaseImporter.cpp ConvertToUTF8 heap-based overflow" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-2152", "datePublished": "2025-03-10T13:31:04.159Z", "dateReserved": "2025-03-10T06:23:20.149Z", "dateUpdated": "2025-05-12T15:35:15.861Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-3196
Vulnerability from cvelistv5
Published
2025-04-04 01:00
Modified
2025-04-04 20:21
Severity ?
4.8 (Medium) - CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
5.3 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
5.3 (Medium) - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
5.3 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
5.3 (Medium) - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
EPSS score ?
Summary
Open Asset Import Library Assimp Malformed File MD2Loader.cpp InternReadFile stack-based overflow
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.303150 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.303150 | signature, permissions-required | |
https://vuldb.com/?submit.545368 | third-party-advisory | |
https://github.com/assimp/assimp/issues/6069 | exploit, issue-tracking | |
https://github.com/assimp/assimp/issues/6069#issuecomment-2763273425 | issue-tracking | |
https://github.com/assimp/assimp/milestone/11 | patch |
Impacted products
▼ | Vendor | Product |
---|---|---|
Open Asset Import Library | Assimp |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-3196", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-04T14:36:56.864617Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-04T20:21:14.303Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://github.com/assimp/assimp/issues/6069" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "modules": [ "Malformed File Handler" ], "product": "Assimp", "vendor": "Open Asset Import Library", "versions": [ { "status": "affected", "version": "5.4.3" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in Open Asset Import Library Assimp 5.4.3. Affected is the function Assimp::MD2Importer::InternReadFile in the library code/AssetLib/MD2/MD2Loader.cpp of the component Malformed File Handler. The manipulation of the argument Name leads to stack-based buffer overflow. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component." }, { "lang": "de", "value": "Es wurde eine Schwachstelle in Open Asset Import Library Assimp 5.4.3 gefunden. Sie wurde als kritisch eingestuft. Es betrifft die Funktion Assimp::MD2Importer::InternReadFile in der Bibliothek code/AssetLib/MD2/MD2Loader.cpp der Komponente Malformed File Handler. Dank Manipulation des Arguments Name mit unbekannten Daten kann eine stack-based buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff hat dabei lokal zu erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung. Als bestm\u00f6gliche Massnahme wird das Einspielen eines Upgrades empfohlen." } ], "metrics": [ { "cvssV4_0": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 4.3, "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "Stack-based Buffer Overflow", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-119", "description": "Memory Corruption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-04T01:00:12.961Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-303150 | Open Asset Import Library Assimp Malformed File MD2Loader.cpp InternReadFile stack-based overflow", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.303150" }, { "name": "VDB-303150 | CTI Indicators (IOB, IOC, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.303150" }, { "name": "Submit #545368 | Open Asset Import Library Assimp 5.4.3 Stack-based Buffer Overflow", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.545368" }, { "tags": [ "exploit", "issue-tracking" ], "url": "https://github.com/assimp/assimp/issues/6069" }, { "tags": [ "issue-tracking" ], "url": "https://github.com/assimp/assimp/issues/6069#issuecomment-2763273425" }, { "tags": [ "patch" ], "url": "https://github.com/assimp/assimp/milestone/11" } ], "timeline": [ { "lang": "en", "time": "2025-04-03T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-04-03T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-04-03T13:03:39.000Z", "value": "VulDB entry last update" } ], "title": "Open Asset Import Library Assimp Malformed File MD2Loader.cpp InternReadFile stack-based overflow" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-3196", "datePublished": "2025-04-04T01:00:12.961Z", "dateReserved": "2025-04-03T10:58:31.836Z", "dateUpdated": "2025-04-04T20:21:14.303Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-3160
Vulnerability from cvelistv5
Published
2025-04-03 14:31
Modified
2025-04-03 14:46
Severity ?
4.8 (Medium) - CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
3.3 (Low) - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
3.3 (Low) - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
EPSS score ?
Summary
Open Asset Import Library Assimp File SceneCombiner.cpp AddNodeHashes out-of-bounds
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.303106 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.303106 | signature, permissions-required | |
https://vuldb.com/?submit.542248 | third-party-advisory | |
https://github.com/assimp/assimp/issues/6025 | issue-tracking | |
https://github.com/assimp/assimp/pull/6049 | issue-tracking | |
https://github.com/assimp/assimp/issues/6025#issue-2877385383 | exploit, issue-tracking | |
https://github.com/assimp/assimp/commit/a0993658f40d8e13ff5823990c30b43c82a5daf0 | patch |
Impacted products
▼ | Vendor | Product |
---|---|---|
Open Asset Import Library | Assimp |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-3160", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-03T14:43:06.152504Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-03T14:46:49.808Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://github.com/assimp/assimp/issues/6025#issue-2877385383" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "modules": [ "File Handler" ], "product": "Assimp", "vendor": "Open Asset Import Library", "versions": [ { "status": "affected", "version": "5.4.3" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "d3ng03 (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in Open Asset Import Library Assimp 5.4.3 and classified as problematic. This vulnerability affects the function Assimp::SceneCombiner::AddNodeHashes of the file code/Common/SceneCombiner.cpp of the component File Handler. The manipulation leads to out-of-bounds read. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The patch is identified as a0993658f40d8e13ff5823990c30b43c82a5daf0. It is recommended to apply a patch to fix this issue." }, { "lang": "de", "value": "In Open Asset Import Library Assimp 5.4.3 wurde eine problematische Schwachstelle gefunden. Das betrifft die Funktion Assimp::SceneCombiner::AddNodeHashes der Datei code/Common/SceneCombiner.cpp der Komponente File Handler. Dank Manipulation mit unbekannten Daten kann eine out-of-bounds read-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs hat dabei lokal zu erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung. Der Patch wird als a0993658f40d8e13ff5823990c30b43c82a5daf0 bezeichnet. Als bestm\u00f6gliche Massnahme wird Patching empfohlen." } ], "metrics": [ { "cvssV4_0": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 1.7, "vectorString": "AV:L/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-Bounds Read", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-119", "description": "Memory Corruption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-03T14:31:06.940Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-303106 | Open Asset Import Library Assimp File SceneCombiner.cpp AddNodeHashes out-of-bounds", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.303106" }, { "name": "VDB-303106 | CTI Indicators (IOB, IOC, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.303106" }, { "name": "Submit #542248 | Open Asset Import Library Assimp \u003e=5.4.3 Out-of-Bounds Read", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.542248" }, { "tags": [ "issue-tracking" ], "url": "https://github.com/assimp/assimp/issues/6025" }, { "tags": [ "issue-tracking" ], "url": "https://github.com/assimp/assimp/pull/6049" }, { "tags": [ "exploit", "issue-tracking" ], "url": "https://github.com/assimp/assimp/issues/6025#issue-2877385383" }, { "tags": [ "patch" ], "url": "https://github.com/assimp/assimp/commit/a0993658f40d8e13ff5823990c30b43c82a5daf0" } ], "timeline": [ { "lang": "en", "time": "2025-04-03T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-04-03T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-04-03T08:59:26.000Z", "value": "VulDB entry last update" } ], "title": "Open Asset Import Library Assimp File SceneCombiner.cpp AddNodeHashes out-of-bounds" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-3160", "datePublished": "2025-04-03T14:31:06.940Z", "dateReserved": "2025-04-03T06:54:18.712Z", "dateUpdated": "2025-04-03T14:46:49.808Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-5169
Vulnerability from cvelistv5
Published
2025-05-26 04:31
Modified
2025-05-28 17:36
Severity ?
4.8 (Medium) - CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
3.3 (Low) - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
3.3 (Low) - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
EPSS score ?
Summary
Open Asset Import Library Assimp MDLLoader.cpp InternReadFile_3DGS_MDL345 out-of-bounds
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.310257 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.310257 | signature, permissions-required | |
https://vuldb.com/?submit.578004 | third-party-advisory | |
https://github.com/assimp/assimp/issues/6171 | issue-tracking | |
https://github.com/assimp/assimp/issues/6128 | issue-tracking | |
https://github.com/user-attachments/files/20208891/reproducer.zip | exploit |
Impacted products
▼ | Vendor | Product |
---|---|---|
Open Asset Import Library | Assimp |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-5169", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-27T14:19:37.044088Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-28T17:36:48.390Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://github.com/assimp/assimp/issues/6171" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Assimp", "vendor": "Open Asset Import Library", "versions": [ { "status": "affected", "version": "5.4.3" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic has been found in Open Asset Import Library Assimp 5.4.3. This affects the function MDLImporter::InternReadFile_3DGS_MDL345 of the file assimp/code/AssetLib/MDL/MDLLoader.cpp. The manipulation leads to out-of-bounds read. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The project decided to collect all Fuzzer bugs in a main-issue to address them in the future." }, { "lang": "de", "value": "Es wurde eine Schwachstelle in Open Asset Import Library Assimp 5.4.3 entdeckt. Sie wurde als problematisch eingestuft. Es geht dabei um die Funktion MDLImporter::InternReadFile_3DGS_MDL345 der Datei assimp/code/AssetLib/MDL/MDLLoader.cpp. Mit der Manipulation mit unbekannten Daten kann eine out-of-bounds read-Schwachstelle ausgenutzt werden. Der Angriff muss lokal erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 1.7, "vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-Bounds Read", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-119", "description": "Memory Corruption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-26T04:31:06.070Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-310257 | Open Asset Import Library Assimp MDLLoader.cpp InternReadFile_3DGS_MDL345 out-of-bounds", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.310257" }, { "name": "VDB-310257 | CTI Indicators (IOB, IOC, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.310257" }, { "name": "Submit #578004 | Open Asset Import Library Assimp 5.4.3 Heap Out of Bounds Read", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.578004" }, { "tags": [ "issue-tracking" ], "url": "https://github.com/assimp/assimp/issues/6171" }, { "tags": [ "issue-tracking" ], "url": "https://github.com/assimp/assimp/issues/6128" }, { "tags": [ "exploit" ], "url": "https://github.com/user-attachments/files/20208891/reproducer.zip" } ], "timeline": [ { "lang": "en", "time": "2025-05-25T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-05-25T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-05-25T15:19:43.000Z", "value": "VulDB entry last update" } ], "title": "Open Asset Import Library Assimp MDLLoader.cpp InternReadFile_3DGS_MDL345 out-of-bounds" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-5169", "datePublished": "2025-05-26T04:31:06.070Z", "dateReserved": "2025-05-25T13:14:31.898Z", "dateUpdated": "2025-05-28T17:36:48.390Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-3549
Vulnerability from cvelistv5
Published
2025-04-14 03:00
Modified
2025-04-14 14:51
Severity ?
4.8 (Medium) - CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
5.3 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
5.3 (Medium) - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
5.3 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
5.3 (Medium) - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
EPSS score ?
Summary
Open Asset Import Library Assimp File MD3Loader.cpp ValidateSurfaceHeaderOffsets heap-based overflow
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.304590 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.304590 | signature, permissions-required | |
https://vuldb.com/?submit.546414 | third-party-advisory | |
https://github.com/assimp/assimp/issues/6070 | issue-tracking | |
https://github.com/user-attachments/files/19580481/Assimp_MD3Importer_ValidateSurfaceHeaderOffsets-hbo.zip | exploit |
Impacted products
▼ | Vendor | Product |
---|---|---|
Open Asset Import Library | Assimp |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-3549", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-14T14:41:34.140140Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-14T14:51:11.154Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "modules": [ "File Handler" ], "product": "Assimp", "vendor": "Open Asset Import Library", "versions": [ { "status": "affected", "version": "5.4.3" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in Open Asset Import Library Assimp 5.4.3. Affected is the function Assimp::MD3Importer::ValidateSurfaceHeaderOffsets of the file code/AssetLib/MD3/MD3Loader.cpp of the component File Handler. The manipulation leads to heap-based buffer overflow. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used." }, { "lang": "de", "value": "Es wurde eine Schwachstelle in Open Asset Import Library Assimp 5.4.3 gefunden. Sie wurde als kritisch eingestuft. Es betrifft die Funktion Assimp::MD3Importer::ValidateSurfaceHeaderOffsets der Datei code/AssetLib/MD3/MD3Loader.cpp der Komponente File Handler. Dank der Manipulation mit unbekannten Daten kann eine heap-based buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff hat dabei lokal zu erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 4.3, "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-119", "description": "Memory Corruption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-14T03:00:08.855Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-304590 | Open Asset Import Library Assimp File MD3Loader.cpp ValidateSurfaceHeaderOffsets heap-based overflow", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.304590" }, { "name": "VDB-304590 | CTI Indicators (IOB, IOC, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.304590" }, { "name": "Submit #546414 | Open Asset Import Library Assimp 5.4.3 Heap-based Buffer Overflow", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.546414" }, { "tags": [ "issue-tracking" ], "url": "https://github.com/assimp/assimp/issues/6070" }, { "tags": [ "exploit" ], "url": "https://github.com/user-attachments/files/19580481/Assimp_MD3Importer_ValidateSurfaceHeaderOffsets-hbo.zip" } ], "timeline": [ { "lang": "en", "time": "2025-04-13T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-04-13T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-04-13T19:52:29.000Z", "value": "VulDB entry last update" } ], "title": "Open Asset Import Library Assimp File MD3Loader.cpp ValidateSurfaceHeaderOffsets heap-based overflow" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-3549", "datePublished": "2025-04-14T03:00:08.855Z", "dateReserved": "2025-04-13T17:47:14.206Z", "dateUpdated": "2025-04-14T14:51:11.154Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-5168
Vulnerability from cvelistv5
Published
2025-05-26 04:00
Modified
2025-05-28 17:36
Severity ?
4.8 (Medium) - CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
3.3 (Low) - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
3.3 (Low) - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
EPSS score ?
Summary
Open Asset Import Library Assimp MDLLoader.cpp ImportUVCoordinate_3DGS_MDL345 out-of-bounds
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.310256 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.310256 | signature, permissions-required | |
https://vuldb.com/?submit.578003 | third-party-advisory | |
https://github.com/assimp/assimp/issues/6170 | issue-tracking | |
https://github.com/assimp/assimp/issues/6128 | issue-tracking | |
https://github.com/user-attachments/files/20208878/reproducer.zip | exploit |
Impacted products
▼ | Vendor | Product |
---|---|---|
Open Asset Import Library | Assimp |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-5168", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-27T14:19:42.755891Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-28T17:36:53.627Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://github.com/assimp/assimp/issues/6170" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Assimp", "vendor": "Open Asset Import Library", "versions": [ { "status": "affected", "version": "5.4.3" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Open Asset Import Library Assimp 5.4.3. It has been rated as problematic. Affected by this issue is the function MDLImporter::ImportUVCoordinate_3DGS_MDL345 of the file assimp/code/AssetLib/MDL/MDLLoader.cpp. The manipulation of the argument iIndex leads to out-of-bounds read. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The project decided to collect all Fuzzer bugs in a main-issue to address them in the future." }, { "lang": "de", "value": "Eine problematische Schwachstelle wurde in Open Asset Import Library Assimp 5.4.3 ausgemacht. Es geht hierbei um die Funktion MDLImporter::ImportUVCoordinate_3DGS_MDL345 der Datei assimp/code/AssetLib/MDL/MDLLoader.cpp. Dank Manipulation des Arguments iIndex mit unbekannten Daten kann eine out-of-bounds read-Schwachstelle ausgenutzt werden. Der Angriff muss lokal passieren. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 1.7, "vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-Bounds Read", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-119", "description": "Memory Corruption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-26T04:00:10.764Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-310256 | Open Asset Import Library Assimp MDLLoader.cpp ImportUVCoordinate_3DGS_MDL345 out-of-bounds", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.310256" }, { "name": "VDB-310256 | CTI Indicators (IOB, IOC, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.310256" }, { "name": "Submit #578003 | Open Asset Import Library Assimp 5.4.3 Heap Out of Bounds Read", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.578003" }, { "tags": [ "issue-tracking" ], "url": "https://github.com/assimp/assimp/issues/6170" }, { "tags": [ "issue-tracking" ], "url": "https://github.com/assimp/assimp/issues/6128" }, { "tags": [ "exploit" ], "url": "https://github.com/user-attachments/files/20208878/reproducer.zip" } ], "timeline": [ { "lang": "en", "time": "2025-05-25T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-05-25T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-05-25T15:19:42.000Z", "value": "VulDB entry last update" } ], "title": "Open Asset Import Library Assimp MDLLoader.cpp ImportUVCoordinate_3DGS_MDL345 out-of-bounds" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-5168", "datePublished": "2025-05-26T04:00:10.764Z", "dateReserved": "2025-05-25T13:14:29.244Z", "dateUpdated": "2025-05-28T17:36:53.627Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-5204
Vulnerability from cvelistv5
Published
2025-05-26 20:31
Modified
2025-05-28 17:34
Severity ?
4.8 (Medium) - CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
3.3 (Low) - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
3.3 (Low) - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
EPSS score ?
Summary
Open Asset Import Library Assimp MDLMaterialLoader.cpp ParseSkinLump_3DGS_MDL7 out-of-bounds
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.310293 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.310293 | signature, permissions-required | |
https://vuldb.com/?submit.578013 | third-party-advisory | |
https://github.com/assimp/assimp/issues/6176 | issue-tracking | |
https://github.com/assimp/assimp/issues/6128 | issue-tracking | |
https://github.com/user-attachments/files/20209911/ParseSkinLump-reproducer.zip | exploit |
Impacted products
▼ | Vendor | Product |
---|---|---|
Open Asset Import Library | Assimp |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-5204", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-27T14:17:35.285986Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-28T17:34:44.012Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://github.com/assimp/assimp/issues/6176" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Assimp", "vendor": "Open Asset Import Library", "versions": [ { "status": "affected", "version": "5.4.3" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic has been found in Open Asset Import Library Assimp 5.4.3. This affects the function MDLImporter::ParseSkinLump_3DGS_MDL7 of the file assimp/code/AssetLib/MDL/MDLMaterialLoader.cpp. The manipulation leads to out-of-bounds read. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The project decided to collect all Fuzzer bugs in a main-issue to address them in the future." }, { "lang": "de", "value": "Es wurde eine Schwachstelle in Open Asset Import Library Assimp 5.4.3 entdeckt. Sie wurde als problematisch eingestuft. Dabei betrifft es die Funktion MDLImporter::ParseSkinLump_3DGS_MDL7 der Datei assimp/code/AssetLib/MDL/MDLMaterialLoader.cpp. Mittels dem Manipulieren mit unbekannten Daten kann eine out-of-bounds read-Schwachstelle ausgenutzt werden. Der Angriff muss lokal erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 1.7, "vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-Bounds Read", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-119", "description": "Memory Corruption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-26T20:31:06.524Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-310293 | Open Asset Import Library Assimp MDLMaterialLoader.cpp ParseSkinLump_3DGS_MDL7 out-of-bounds", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.310293" }, { "name": "VDB-310293 | CTI Indicators (IOB, IOC, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.310293" }, { "name": "Submit #578013 | Open Asset Import Library Assimp 5.4.3 Heap Out of Bounds Read", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.578013" }, { "tags": [ "issue-tracking" ], "url": "https://github.com/assimp/assimp/issues/6176" }, { "tags": [ "issue-tracking" ], "url": "https://github.com/assimp/assimp/issues/6128" }, { "tags": [ "exploit" ], "url": "https://github.com/user-attachments/files/20209911/ParseSkinLump-reproducer.zip" } ], "timeline": [ { "lang": "en", "time": "2025-05-26T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-05-26T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-05-26T15:08:51.000Z", "value": "VulDB entry last update" } ], "title": "Open Asset Import Library Assimp MDLMaterialLoader.cpp ParseSkinLump_3DGS_MDL7 out-of-bounds" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-5204", "datePublished": "2025-05-26T20:31:06.524Z", "dateReserved": "2025-05-26T13:03:40.310Z", "dateUpdated": "2025-05-28T17:34:44.012Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-5167
Vulnerability from cvelistv5
Published
2025-05-26 03:31
Modified
2025-05-28 17:36
Severity ?
4.8 (Medium) - CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
3.3 (Low) - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
3.3 (Low) - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
EPSS score ?
Summary
Open Asset Import Library Assimp LWOLoader.h GetS0 out-of-bounds
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.310255 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.310255 | signature, permissions-required | |
https://vuldb.com/?submit.578002 | third-party-advisory | |
https://github.com/assimp/assimp/issues/6169 | issue-tracking | |
https://github.com/assimp/assimp/issues/6128 | issue-tracking | |
https://github.com/user-attachments/files/20208666/reproducer.zip | exploit |
Impacted products
▼ | Vendor | Product |
---|---|---|
Open Asset Import Library | Assimp |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-5167", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-27T14:19:49.418408Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-28T17:36:59.316Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://github.com/assimp/assimp/issues/6169" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Assimp", "vendor": "Open Asset Import Library", "versions": [ { "status": "affected", "version": "5.4.3" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Open Asset Import Library Assimp 5.4.3. It has been declared as problematic. Affected by this vulnerability is the function LWOImporter::GetS0 in the library assimp/code/AssetLib/LWO/LWOLoader.h. The manipulation of the argument out leads to out-of-bounds read. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The project decided to collect all Fuzzer bugs in a main-issue to address them in the future." }, { "lang": "de", "value": "In Open Asset Import Library Assimp 5.4.3 wurde eine problematische Schwachstelle ausgemacht. Es geht um die Funktion LWOImporter::GetS0 in der Bibliothek assimp/code/AssetLib/LWO/LWOLoader.h. Dank der Manipulation des Arguments out mit unbekannten Daten kann eine out-of-bounds read-Schwachstelle ausgenutzt werden. Der Angriff muss lokal angegangen werden. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 1.7, "vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-Bounds Read", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-119", "description": "Memory Corruption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-26T03:31:05.586Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-310255 | Open Asset Import Library Assimp LWOLoader.h GetS0 out-of-bounds", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.310255" }, { "name": "VDB-310255 | CTI Indicators (IOB, IOC, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.310255" }, { "name": "Submit #578002 | Open Asset Import Library Assimp 5.4.3 Heap Out of Bounds Read", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.578002" }, { "tags": [ "issue-tracking" ], "url": "https://github.com/assimp/assimp/issues/6169" }, { "tags": [ "issue-tracking" ], "url": "https://github.com/assimp/assimp/issues/6128" }, { "tags": [ "exploit" ], "url": "https://github.com/user-attachments/files/20208666/reproducer.zip" } ], "timeline": [ { "lang": "en", "time": "2025-05-25T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-05-25T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-05-25T15:19:40.000Z", "value": "VulDB entry last update" } ], "title": "Open Asset Import Library Assimp LWOLoader.h GetS0 out-of-bounds" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-5167", "datePublished": "2025-05-26T03:31:05.586Z", "dateReserved": "2025-05-25T13:14:26.550Z", "dateUpdated": "2025-05-28T17:36:59.316Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-5166
Vulnerability from cvelistv5
Published
2025-05-26 03:00
Modified
2025-05-28 17:37
Severity ?
4.8 (Medium) - CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
3.3 (Low) - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
3.3 (Low) - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
EPSS score ?
Summary
Open Asset Import Library Assimp MDC File Parser MDCLoader.cpp InternReadFile out-of-bounds
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.310254 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.310254 | signature, permissions-required | |
https://vuldb.com/?submit.578001 | third-party-advisory | |
https://github.com/assimp/assimp/issues/6168 | issue-tracking | |
https://github.com/assimp/assimp/issues/6128 | issue-tracking | |
https://github.com/user-attachments/files/20208318/reproducer.zip | exploit |
Impacted products
▼ | Vendor | Product |
---|---|---|
Open Asset Import Library | Assimp |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-5166", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-27T14:19:55.309982Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-28T17:37:05.775Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://github.com/assimp/assimp/issues/6168" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "modules": [ "MDC File Parser" ], "product": "Assimp", "vendor": "Open Asset Import Library", "versions": [ { "status": "affected", "version": "5.4.3" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Open Asset Import Library Assimp 5.4.3. It has been classified as problematic. Affected is the function MDCImporter::InternReadFile of the file assimp/code/AssetLib/MDC/MDCLoader.cpp of the component MDC File Parser. The manipulation of the argument pcVerts leads to out-of-bounds read. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The project decided to collect all Fuzzer bugs in a main-issue to address them in the future." }, { "lang": "de", "value": "Es wurde eine problematische Schwachstelle in Open Asset Import Library Assimp 5.4.3 ausgemacht. Betroffen hiervon ist die Funktion MDCImporter::InternReadFile der Datei assimp/code/AssetLib/MDC/MDCLoader.cpp der Komponente MDC File Parser. Durch Beeinflussen des Arguments pcVerts mit unbekannten Daten kann eine out-of-bounds read-Schwachstelle ausgenutzt werden. Der Angriff hat dabei lokal zu erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 1.7, "vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-Bounds Read", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-119", "description": "Memory Corruption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-26T03:00:12.418Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-310254 | Open Asset Import Library Assimp MDC File Parser MDCLoader.cpp InternReadFile out-of-bounds", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.310254" }, { "name": "VDB-310254 | CTI Indicators (IOB, IOC, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.310254" }, { "name": "Submit #578001 | Open Asset Import Library Assimp 5.4.3 Heap Out of Bounds Read", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.578001" }, { "tags": [ "issue-tracking" ], "url": "https://github.com/assimp/assimp/issues/6168" }, { "tags": [ "issue-tracking" ], "url": "https://github.com/assimp/assimp/issues/6128" }, { "tags": [ "exploit" ], "url": "https://github.com/user-attachments/files/20208318/reproducer.zip" } ], "timeline": [ { "lang": "en", "time": "2025-05-25T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-05-25T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-05-25T15:19:39.000Z", "value": "VulDB entry last update" } ], "title": "Open Asset Import Library Assimp MDC File Parser MDCLoader.cpp InternReadFile out-of-bounds" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-5166", "datePublished": "2025-05-26T03:00:12.418Z", "dateReserved": "2025-05-25T13:14:23.794Z", "dateUpdated": "2025-05-28T17:37:05.775Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-6119
Vulnerability from cvelistv5
Published
2025-06-16 11:00
Modified
2025-06-16 15:35
Severity ?
1.9 (Low) - CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
5.3 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RC:R
5.3 (Medium) - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RC:R
5.3 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RC:R
5.3 (Medium) - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RC:R
EPSS score ?
Summary
Open Asset Import Library Assimp BVHLoader.cpp ReadNodeChannels use after free
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.312588 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.312588 | signature, permissions-required | |
https://vuldb.com/?submit.591233 | third-party-advisory | |
https://github.com/assimp/assimp/issues/6219 | issue-tracking | |
https://github.com/assimp/assimp/issues/6219#issuecomment-2945016005 | issue-tracking | |
https://github.com/user-attachments/files/20604791/reproduce_2.tar.gz | exploit |
Impacted products
▼ | Vendor | Product |
---|---|---|
Open Asset Import Library | Assimp |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-6119", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-16T15:34:52.987047Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-16T15:35:22.956Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Assimp", "vendor": "Open Asset Import Library", "versions": [ { "status": "affected", "version": "5.4.0" }, { "status": "affected", "version": "5.4.1" }, { "status": "affected", "version": "5.4.2" }, { "status": "affected", "version": "5.4.3" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Rulkallos (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in Open Asset Import Library Assimp up to 5.4.3. Affected is the function Assimp::BVHLoader::ReadNodeChannels in the library assimp/code/AssetLib/BVH/BVHLoader.cpp. The manipulation of the argument pNode leads to use after free. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The project decided to collect all Fuzzer bugs in a main-issue to address them in the future." }, { "lang": "de", "value": "Es wurde eine kritische Schwachstelle in Open Asset Import Library Assimp bis 5.4.3 entdeckt. Dabei betrifft es die Funktion Assimp::BVHLoader::ReadNodeChannels in der Bibliothek assimp/code/AssetLib/BVH/BVHLoader.cpp. Dank Manipulation des Arguments pNode mit unbekannten Daten kann eine use after free-Schwachstelle ausgenutzt werden. Der Angriff hat dabei lokal zu erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 4.3, "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "Use After Free", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-119", "description": "Memory Corruption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-16T11:00:09.282Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-312588 | Open Asset Import Library Assimp BVHLoader.cpp ReadNodeChannels use after free", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.312588" }, { "name": "VDB-312588 | CTI Indicators (IOB, IOC, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.312588" }, { "name": "Submit #591233 | Open Asset Import Library Assimp 5.4.3 Use After Free", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.591233" }, { "tags": [ "issue-tracking" ], "url": "https://github.com/assimp/assimp/issues/6219" }, { "tags": [ "issue-tracking" ], "url": "https://github.com/assimp/assimp/issues/6219#issuecomment-2945016005" }, { "tags": [ "exploit" ], "url": "https://github.com/user-attachments/files/20604791/reproduce_2.tar.gz" } ], "timeline": [ { "lang": "en", "time": "2025-06-15T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-06-15T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-06-15T12:23:16.000Z", "value": "VulDB entry last update" } ], "title": "Open Asset Import Library Assimp BVHLoader.cpp ReadNodeChannels use after free" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-6119", "datePublished": "2025-06-16T11:00:09.282Z", "dateReserved": "2025-06-15T10:18:07.594Z", "dateUpdated": "2025-06-16T15:35:22.956Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45679
Vulnerability from cvelistv5
Published
2024-09-18 03:35
Modified
2024-09-18 15:27
Severity ?
EPSS score ?
Summary
Heap-based buffer overflow vulnerability in Assimp versions prior to 5.4.3 allows a local attacker to execute arbitrary code by importing a specially crafted file into the product.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Open Asset Import Library | Assimp |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:assimp:assimp:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "assimp", "vendor": "assimp", "versions": [ { "lessThan": "5.4.3", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-45679", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T15:25:14.510896Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122 Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-18T15:27:31.758Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Assimp", "vendor": "Open Asset Import Library", "versions": [ { "status": "affected", "version": "prior to 5.4.3" } ] } ], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow vulnerability in Assimp versions prior to 5.4.3 allows a local attacker to execute arbitrary code by importing a specially crafted file into the product." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap-based buffer overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-18T03:35:30.462Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://github.com/assimp/assimp/releases/tag/v5.4.3" }, { "url": "https://jvn.jp/en/jp/JVN42386607/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2024-45679", "datePublished": "2024-09-18T03:35:30.462Z", "dateReserved": "2024-09-03T23:41:53.835Z", "dateUpdated": "2024-09-18T15:27:31.758Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-3016
Vulnerability from cvelistv5
Published
2025-03-31 21:00
Modified
2025-03-31 21:19
Severity ?
5.3 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
4.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
4.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
EPSS score ?
Summary
Open Asset Import Library Assimp MDL File MDLMaterialLoader.cpp ParseTextureColorData resource consumption
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.302068 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.302068 | signature, permissions-required | |
https://vuldb.com/?submit.524593 | third-party-advisory | |
https://github.com/assimp/assimp/issues/6022 | issue-tracking | |
https://github.com/assimp/assimp/pull/6046 | issue-tracking | |
https://github.com/assimp/assimp/commit/5d2a7482312db2e866439a8c05a07ce1e718bed1 | patch |
Impacted products
▼ | Vendor | Product |
---|---|---|
Open Asset Import Library | Assimp |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-3016", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-31T21:19:23.311285Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-31T21:19:54.032Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://github.com/assimp/assimp/issues/6022" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "modules": [ "MDL File Handler" ], "product": "Assimp", "vendor": "Open Asset Import Library", "versions": [ { "status": "affected", "version": "5.4.3" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "d3ng03 (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic was found in Open Asset Import Library Assimp 5.4.3. This vulnerability affects the function Assimp::MDLImporter::ParseTextureColorData of the file code/AssetLib/MDL/MDLMaterialLoader.cpp of the component MDL File Handler. The manipulation of the argument mWidth/mHeight leads to resource consumption. The attack can be initiated remotely. Upgrading to version 6.0 is able to address this issue. The name of the patch is 5d2a7482312db2e866439a8c05a07ce1e718bed1. It is recommended to apply a patch to fix this issue." }, { "lang": "de", "value": "In Open Asset Import Library Assimp 5.4.3 wurde eine Schwachstelle entdeckt. Sie wurde als problematisch eingestuft. Dabei geht es um die Funktion Assimp::MDLImporter::ParseTextureColorData der Datei code/AssetLib/MDL/MDLMaterialLoader.cpp der Komponente MDL File Handler. Durch Manipulieren des Arguments mWidth/mHeight mit unbekannten Daten kann eine resource consumption-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Ein Aktualisieren auf die Version 6.0 vermag dieses Problem zu l\u00f6sen. Der Patch wird als 5d2a7482312db2e866439a8c05a07ce1e718bed1 bezeichnet. Als bestm\u00f6gliche Massnahme wird Patching empfohlen." } ], "metrics": [ { "cvssV4_0": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 5, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "Resource Consumption", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-404", "description": "Denial of Service", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-31T21:00:10.538Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-302068 | Open Asset Import Library Assimp MDL File MDLMaterialLoader.cpp ParseTextureColorData resource consumption", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.302068" }, { "name": "VDB-302068 | CTI Indicators (IOB, IOC, TTP, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.302068" }, { "name": "Submit #524593 | Open Asset Import Library Assimp \u003e=5.4.3 Uncontrolled Memory Allocation", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.524593" }, { "tags": [ "issue-tracking" ], "url": "https://github.com/assimp/assimp/issues/6022" }, { "tags": [ "issue-tracking" ], "url": "https://github.com/assimp/assimp/pull/6046" }, { "tags": [ "patch" ], "url": "https://github.com/assimp/assimp/commit/5d2a7482312db2e866439a8c05a07ce1e718bed1" } ], "timeline": [ { "lang": "en", "time": "2025-03-31T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-03-31T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-03-31T07:43:03.000Z", "value": "VulDB entry last update" } ], "title": "Open Asset Import Library Assimp MDL File MDLMaterialLoader.cpp ParseTextureColorData resource consumption" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-3016", "datePublished": "2025-03-31T21:00:10.538Z", "dateReserved": "2025-03-31T05:37:57.633Z", "dateUpdated": "2025-03-31T21:19:54.032Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-5202
Vulnerability from cvelistv5
Published
2025-05-26 19:31
Modified
2025-05-28 17:34
Severity ?
4.8 (Medium) - CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
3.3 (Low) - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
3.3 (Low) - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
EPSS score ?
Summary
Open Asset Import Library Assimp HL1MDLLoader.cpp validate_header out-of-bounds
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.310291 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.310291 | signature, permissions-required | |
https://vuldb.com/?submit.578007 | third-party-advisory | |
https://github.com/assimp/assimp/issues/6174 | issue-tracking | |
https://github.com/assimp/assimp/issues/6128 | issue-tracking | |
https://github.com/user-attachments/files/20209236/reproducer.zip | exploit |
Impacted products
▼ | Vendor | Product |
---|---|---|
Open Asset Import Library | Assimp |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-5202", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-27T14:17:46.061643Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-28T17:34:55.692Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://github.com/assimp/assimp/issues/6174" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Assimp", "vendor": "Open Asset Import Library", "versions": [ { "status": "affected", "version": "5.4.3" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Open Asset Import Library Assimp 5.4.3. It has been declared as problematic. Affected by this vulnerability is the function HL1MDLLoader::validate_header of the file assimp/code/AssetLib/MDL/HalfLife/HL1MDLLoader.cpp. The manipulation leads to out-of-bounds read. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The project decided to collect all Fuzzer bugs in a main-issue to address them in the future." }, { "lang": "de", "value": "In Open Asset Import Library Assimp 5.4.3 wurde eine problematische Schwachstelle ausgemacht. Das betrifft die Funktion HL1MDLLoader::validate_header der Datei assimp/code/AssetLib/MDL/HalfLife/HL1MDLLoader.cpp. Durch die Manipulation mit unbekannten Daten kann eine out-of-bounds read-Schwachstelle ausgenutzt werden. Der Angriff muss lokal angegangen werden. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 1.7, "vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-Bounds Read", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-119", "description": "Memory Corruption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-26T19:31:06.228Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-310291 | Open Asset Import Library Assimp HL1MDLLoader.cpp validate_header out-of-bounds", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.310291" }, { "name": "VDB-310291 | CTI Indicators (IOB, IOC, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.310291" }, { "name": "Submit #578007 | Open Asset Import Library Assimp 5.4.3 Heap Out of Bounds Read", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.578007" }, { "tags": [ "issue-tracking" ], "url": "https://github.com/assimp/assimp/issues/6174" }, { "tags": [ "issue-tracking" ], "url": "https://github.com/assimp/assimp/issues/6128" }, { "tags": [ "exploit" ], "url": "https://github.com/user-attachments/files/20209236/reproducer.zip" } ], "timeline": [ { "lang": "en", "time": "2025-05-26T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-05-26T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-05-26T15:08:48.000Z", "value": "VulDB entry last update" } ], "title": "Open Asset Import Library Assimp HL1MDLLoader.cpp validate_header out-of-bounds" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-5202", "datePublished": "2025-05-26T19:31:06.228Z", "dateReserved": "2025-05-26T13:03:34.839Z", "dateUpdated": "2025-05-28T17:34:55.692Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-6120
Vulnerability from cvelistv5
Published
2025-06-16 11:31
Modified
2025-06-16 14:47
Severity ?
1.9 (Low) - CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
5.3 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RC:R
5.3 (Medium) - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RC:R
5.3 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RC:R
5.3 (Medium) - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RC:R
EPSS score ?
Summary
Open Asset Import Library Assimp HL1MDLLoader.cpp read_meshes heap-based overflow
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.312589 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.312589 | signature, permissions-required | |
https://vuldb.com/?submit.591235 | third-party-advisory | |
https://github.com/assimp/assimp/issues/6220 | issue-tracking | |
https://github.com/assimp/assimp/issues/6220#issuecomment-2945018579 | issue-tracking | |
https://github.com/user-attachments/files/20605340/read_meshes_reproduce.tar.gz | exploit |
Impacted products
▼ | Vendor | Product |
---|---|---|
Open Asset Import Library | Assimp |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-6120", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-16T14:41:43.487968Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-16T14:47:28.362Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Assimp", "vendor": "Open Asset Import Library", "versions": [ { "status": "affected", "version": "5.4.0" }, { "status": "affected", "version": "5.4.1" }, { "status": "affected", "version": "5.4.2" }, { "status": "affected", "version": "5.4.3" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Rulkallos (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in Open Asset Import Library Assimp up to 5.4.3. Affected by this vulnerability is the function read_meshes in the library assimp/code/AssetLib/MDL/HalfLife/HL1MDLLoader.cpp. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The project decided to collect all Fuzzer bugs in a main-issue to address them in the future." }, { "lang": "de", "value": "In Open Asset Import Library Assimp bis 5.4.3 wurde eine kritische Schwachstelle entdeckt. Hierbei betrifft es die Funktion read_meshes in der Bibliothek assimp/code/AssetLib/MDL/HalfLife/HL1MDLLoader.cpp. Mit der Manipulation mit unbekannten Daten kann eine heap-based buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff muss lokal angegangen werden. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 4.3, "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-119", "description": "Memory Corruption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-16T11:31:06.030Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-312589 | Open Asset Import Library Assimp HL1MDLLoader.cpp read_meshes heap-based overflow", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.312589" }, { "name": "VDB-312589 | CTI Indicators (IOB, IOC, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.312589" }, { "name": "Submit #591235 | Open Asset Import Library Assimp 5.4.3 Heap-based Buffer Overflow", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.591235" }, { "tags": [ "issue-tracking" ], "url": "https://github.com/assimp/assimp/issues/6220" }, { "tags": [ "issue-tracking" ], "url": "https://github.com/assimp/assimp/issues/6220#issuecomment-2945018579" }, { "tags": [ "exploit" ], "url": "https://github.com/user-attachments/files/20605340/read_meshes_reproduce.tar.gz" } ], "timeline": [ { "lang": "en", "time": "2025-06-15T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-06-15T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-06-15T12:23:17.000Z", "value": "VulDB entry last update" } ], "title": "Open Asset Import Library Assimp HL1MDLLoader.cpp read_meshes heap-based overflow" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-6120", "datePublished": "2025-06-16T11:31:06.030Z", "dateReserved": "2025-06-15T10:18:10.430Z", "dateUpdated": "2025-06-16T14:47:28.362Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
jvndb-2024-000073
Vulnerability from jvndb
Published
2024-07-18 13:44
Modified
2024-07-18 13:44
Severity ?
Summary
Assimp vulnerable to heap-based buffer overflow
Details
Assimp provided by Open Asset Import Library contains a heap-based buffer overflow vulnerability (CWE-122).
Yuhei Kawakoya of NTT Security Holdings reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
▼ | Type | URL |
---|---|---|
JVN | https://jvn.jp/en/jp/JVN87710540/index.html | |
CVE | https://www.cve.org/CVERecord?id=CVE-2024-40724 | |
Buffer Errors(CWE-119) | https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html |
Impacted products
▼ | Vendor | Product |
---|---|---|
Open Asset Import Library | Assimp |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000073.html", "dc:date": "2024-07-18T13:44+09:00", "dcterms:issued": "2024-07-18T13:44+09:00", "dcterms:modified": "2024-07-18T13:44+09:00", "description": "Assimp provided by Open Asset Import Library contains a heap-based buffer overflow vulnerability (CWE-122).\r\n\r\nYuhei Kawakoya of NTT Security Holdings reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000073.html", "sec:cpe": { "#text": "cpe:/a:misc:open_asset_import_library_assimp", "@product": "Assimp", "@vendor": "Open Asset Import Library", "@version": "2.2" }, "sec:cvss": { "@score": "8.4", "@severity": "High", "@type": "Base", "@vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "@version": "3.0" }, "sec:identifier": "JVNDB-2024-000073", "sec:references": [ { "#text": "https://jvn.jp/en/jp/JVN87710540/index.html", "@id": "JVN#87710540", "@source": "JVN" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2024-40724", "@id": "CVE-2024-40724", "@source": "CVE" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-119", "@title": "Buffer Errors(CWE-119)" } ], "title": "Assimp vulnerable to heap-based buffer overflow" }
jvndb-2024-000099
Vulnerability from jvndb
Published
2024-09-18 14:20
Modified
2024-09-18 14:20
Severity ?
Summary
Assimp vulnerable to heap-based buffer overflow
Details
PlyLoader.cpp of Assimp provided by Open Asset Import Library contains a heap-based buffer overflow vulnerability (CWE-122).
Yuhei Kawakoya of NTT Security Holdings reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
▼ | Type | URL |
---|---|---|
JVN | https://jvn.jp/en/jp/JVN42386607/index.html | |
CVE | https://www.cve.org/CVERecord?id=CVE-2024-45679 | |
Buffer Errors(CWE-119) | https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html |
Impacted products
▼ | Vendor | Product |
---|---|---|
Open Asset Import Library | Assimp |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000099.html", "dc:date": "2024-09-18T14:20+09:00", "dcterms:issued": "2024-09-18T14:20+09:00", "dcterms:modified": "2024-09-18T14:20+09:00", "description": "PlyLoader.cpp of Assimp provided by Open Asset Import Library contains a heap-based buffer overflow vulnerability (CWE-122).\r\n\r\nYuhei Kawakoya of NTT Security Holdings reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000099.html", "sec:cpe": { "#text": "cpe:/a:misc:open_asset_import_library_assimp", "@product": "Assimp", "@vendor": "Open Asset Import Library", "@version": "2.2" }, "sec:cvss": { "@score": "8.4", "@severity": "High", "@type": "Base", "@vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "@version": "3.0" }, "sec:identifier": "JVNDB-2024-000099", "sec:references": [ { "#text": "https://jvn.jp/en/jp/JVN42386607/index.html", "@id": "JVN#42386607", "@source": "JVN" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2024-45679", "@id": "CVE-2024-45679", "@source": "CVE" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-119", "@title": "Buffer Errors(CWE-119)" } ], "title": "Assimp vulnerable to heap-based buffer overflow" }