Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-48425

Опубликовано: 24 окт. 2024
Источник: debian
EPSS Низкий

Описание

A segmentation fault (SEGV) was detected in the Assimp::SplitLargeMeshesProcess_Triangle::UpdateNode function within the Assimp library during fuzz testing using AddressSanitizer. The crash occurs due to a read access violation at address 0x000000000460, which points to the zero page, indicating a null or invalid pointer dereference.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
assimpunfixedpackage
assimppostponedtrixiepackage
assimppostponedbookwormpackage
assimppostponedbullseyepackage

Примечания

  • https://github.com/assimp/assimp/issues/5791

  • https://github.com/assimp/assimp/commit/ecdf8d24b85367b22ba353b4f82299d4af7f1f97

  • https://github.com/assimp/assimp/pull/5799

EPSS

Процентиль: 7%
0.00031
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
8 месяцев назад

A segmentation fault (SEGV) was detected in the Assimp::SplitLargeMeshesProcess_Triangle::UpdateNode function within the Assimp library during fuzz testing using AddressSanitizer. The crash occurs due to a read access violation at address 0x000000000460, which points to the zero page, indicating a null or invalid pointer dereference.

CVSS3: 5.5
redhat
8 месяцев назад

A segmentation fault (SEGV) was detected in the Assimp::SplitLargeMeshesProcess_Triangle::UpdateNode function within the Assimp library during fuzz testing using AddressSanitizer. The crash occurs due to a read access violation at address 0x000000000460, which points to the zero page, indicating a null or invalid pointer dereference.

CVSS3: 5.5
nvd
8 месяцев назад

A segmentation fault (SEGV) was detected in the Assimp::SplitLargeMeshesProcess_Triangle::UpdateNode function within the Assimp library during fuzz testing using AddressSanitizer. The crash occurs due to a read access violation at address 0x000000000460, which points to the zero page, indicating a null or invalid pointer dereference.

CVSS3: 5.5
github
8 месяцев назад

A segmentation fault (SEGV) was detected in the Assimp::SplitLargeMeshesProcess_Triangle::UpdateNode function within the Assimp library during fuzz testing using AddressSanitizer. The crash occurs due to a read access violation at address 0x000000000460, which points to the zero page, indicating a null or invalid pointer dereference.

CVSS3: 5.5
fstec
8 месяцев назад

Уязвимость функции Assimp::SplitLargeMeshesProcess_Triangle::UpdateNode() библиотеки импорта 3D-моделей Open Asset Import Library (Assimp), позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 7%
0.00031
Низкий