Lucene search

K

8 matches found

CVE
CVE
added 2024/07/19 8:15 a.m.67 views

CVE-2024-40724

Heap-based buffer overflow vulnerability in Assimp versions prior to 5.4.2 allows a local attacker to execute arbitrary code by inputting a specially crafted file into the product.

8.4CVSS7.5AI score0.0009EPSS
CVE
CVE
added 2024/11/21 2:15 p.m.54 views

CVE-2024-53425

A heap-buffer-overflow vulnerability was discovered in the SkipSpacesAndLineEnd function in Assimp v5.4.3. This issue occurs when processing certain malformed MD5 model files, leading to an out-of-bounds read and potential application crash.

6.2CVSS6.8AI score0.00032EPSS
CVE
CVE
added 2024/09/18 4:15 a.m.53 views

CVE-2024-45679

Heap-based buffer overflow vulnerability in Assimp versions prior to 5.4.3 allows a local attacker to execute arbitrary code by importing a specially crafted file into the product.

8.4CVSS8.1AI score0.00096EPSS
CVE
CVE
added 2024/10/24 9:15 p.m.53 views

CVE-2024-48423

An issue in assimp v.5.4.3 allows a local attacker to execute arbitrary code via the CallbackToLogRedirector function within the Assimp library.

8.4CVSS7.6AI score0.00034EPSS
CVE
CVE
added 2024/10/24 9:15 p.m.46 views

CVE-2024-48424

A heap-buffer-overflow vulnerability has been identified in the OpenDDLParser::parseStructure function within the Assimp library, specifically during the processing of OpenGEX files.

5.5CVSS7AI score0.00037EPSS
CVE
CVE
added 2024/10/24 9:15 p.m.43 views

CVE-2024-48425

A segmentation fault (SEGV) was detected in the Assimp::SplitLargeMeshesProcess_Triangle::UpdateNode function within the Assimp library during fuzz testing using AddressSanitizer. The crash occurs due to a read access violation at address 0x000000000460, which points to the zero page, indicating a ...

5.5CVSS6.4AI score0.00037EPSS
CVE
CVE
added 2024/09/26 4:15 p.m.41 views

CVE-2024-46632

Assimp v5.4.3 is vulnerable to Buffer Overflow via the MD5Importer::LoadMD5MeshFile function.

4.3CVSS6.6AI score0.0032EPSS
CVE
CVE
added 2024/10/24 9:15 p.m.40 views

CVE-2024-48426

A segmentation fault (SEGV) was detected in the SortByPTypeProcess::Execute function in the Assimp library during fuzz testing with AddressSanitizer. The crash occurred due to a read access to an invalid memory address (0x1000c9714971).

6.2CVSS6.9AI score0.00107EPSS