CVE-2025-2755

A vulnerability was found in Open Asset Import Library Assimp 5.4.3. It has been rated as critical. Affected by this issue is the function Assimp::AC3DImporter::ConvertObjectSection of the file code/AssetLib/AC/ACLoader.cpp of the component AC3D File Handler. The manipulation of the argument src.entries leads to out-of-bounds read. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
References
Link Resource
https://github.com/assimp/assimp/issues/6017 Exploit Issue Tracking
https://github.com/assimp/assimp/issues/6017#issue-2877374161 Exploit Issue Tracking
https://vuldb.com/?ctiid.300860 Permissions Required VDB Entry
https://vuldb.com/?id.300860 Third Party Advisory VDB Entry
https://vuldb.com/?submit.517789 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:assimp:assimp:5.4.3:*:*:*:*:*:*:*

History

17 Jul 2025, 21:48

Type Values Removed Values Added
References () https://github.com/assimp/assimp/issues/6017 - () https://github.com/assimp/assimp/issues/6017 - Exploit, Issue Tracking
References () https://github.com/assimp/assimp/issues/6017#issue-2877374161 - () https://github.com/assimp/assimp/issues/6017#issue-2877374161 - Exploit, Issue Tracking
References () https://vuldb.com/?ctiid.300860 - () https://vuldb.com/?ctiid.300860 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.300860 - () https://vuldb.com/?id.300860 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.517789 - () https://vuldb.com/?submit.517789 - Third Party Advisory, VDB Entry
CPE cpe:2.3:a:assimp:assimp:5.4.3:*:*:*:*:*:*:*
First Time Assimp assimp
Assimp

27 Mar 2025, 16:45

Type Values Removed Values Added
Summary
  • (es) Se encontró una vulnerabilidad en Open Asset Import Library Assimp 5.4.3. Se ha clasificado como crítica. Este problema afecta a la función Assimp::AC3DImporter::ConvertObjectSection del archivo code/AssetLib/AC/ACLoader.cpp del componente AC3D File Handler. La manipulación del argumento src.entries provoca una lectura fuera de los límites. El ataque puede ejecutarse remotamente. Se ha hecho público el exploit y puede que sea utilizado.

25 Mar 2025, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-25 09:15

Updated : 2025-07-17 21:48


NVD link : CVE-2025-2755

Mitre link : CVE-2025-2755

CVE.ORG link : CVE-2025-2755


JSON object : View

Products Affected

assimp

  • assimp
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-125

Out-of-bounds Read