CVE-2024-48425

A segmentation fault (SEGV) was detected in the Assimp::SplitLargeMeshesProcess_Triangle::UpdateNode function within the Assimp library during fuzz testing using AddressSanitizer. The crash occurs due to a read access violation at address 0x000000000460, which points to the zero page, indicating a null or invalid pointer dereference.
References
Link Resource
https://github.com/assimp/assimp/issues/5791 Exploit Issue Tracking Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:assimp:assimp:5.4.3:*:*:*:*:*:*:*

History

10 Jun 2025, 18:47

Type Values Removed Values Added
First Time Assimp assimp
Assimp
References () https://github.com/assimp/assimp/issues/5791 - () https://github.com/assimp/assimp/issues/5791 - Exploit, Issue Tracking, Vendor Advisory
CPE cpe:2.3:a:assimp:assimp:5.4.3:*:*:*:*:*:*:*

Information

Published : 2024-10-24 21:15

Updated : 2025-06-10 18:47


NVD link : CVE-2024-48425

Mitre link : CVE-2024-48425

CVE.ORG link : CVE-2024-48425


JSON object : View

Products Affected

assimp

  • assimp
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')