Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-48425

Опубликовано: 24 окт. 2024
Источник: debian
EPSS Низкий

Описание

A segmentation fault (SEGV) was detected in the Assimp::SplitLargeMeshesProcess_Triangle::UpdateNode function within the Assimp library during fuzz testing using AddressSanitizer. The crash occurs due to a read access violation at address 0x000000000460, which points to the zero page, indicating a null or invalid pointer dereference.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
assimpfixed6.0.2+ds-1package
assimppostponedtrixiepackage
assimppostponedbookwormpackage
assimppostponedbullseyepackage

Примечания

  • https://github.com/assimp/assimp/issues/5791

  • https://github.com/assimp/assimp/commit/ecdf8d24b85367b22ba353b4f82299d4af7f1f97 (v6.0.0)

  • https://github.com/assimp/assimp/pull/5799

EPSS

Процентиль: 11%
0.00039
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
11 месяцев назад

A segmentation fault (SEGV) was detected in the Assimp::SplitLargeMeshesProcess_Triangle::UpdateNode function within the Assimp library during fuzz testing using AddressSanitizer. The crash occurs due to a read access violation at address 0x000000000460, which points to the zero page, indicating a null or invalid pointer dereference.

CVSS3: 5.5
redhat
11 месяцев назад

A segmentation fault (SEGV) was detected in the Assimp::SplitLargeMeshesProcess_Triangle::UpdateNode function within the Assimp library during fuzz testing using AddressSanitizer. The crash occurs due to a read access violation at address 0x000000000460, which points to the zero page, indicating a null or invalid pointer dereference.

CVSS3: 5.5
nvd
11 месяцев назад

A segmentation fault (SEGV) was detected in the Assimp::SplitLargeMeshesProcess_Triangle::UpdateNode function within the Assimp library during fuzz testing using AddressSanitizer. The crash occurs due to a read access violation at address 0x000000000460, which points to the zero page, indicating a null or invalid pointer dereference.

CVSS3: 5.5
github
11 месяцев назад

A segmentation fault (SEGV) was detected in the Assimp::SplitLargeMeshesProcess_Triangle::UpdateNode function within the Assimp library during fuzz testing using AddressSanitizer. The crash occurs due to a read access violation at address 0x000000000460, which points to the zero page, indicating a null or invalid pointer dereference.

CVSS3: 5.5
fstec
11 месяцев назад

Уязвимость функции Assimp::SplitLargeMeshesProcess_Triangle::UpdateNode() библиотеки импорта 3D-моделей Open Asset Import Library (Assimp), позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 11%
0.00039
Низкий