Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2025-12926

Опубликовано: 03 апр. 2025
Источник: fstec
CVSS3: 3.3
CVSS2: 2.1
EPSS Низкий

Описание

Уязвимость функции Assimp::SceneCombiner::AddNodeHashes() (code/Common/SceneCombiner.cpp) библиотеки импорта 3D-моделей Open Asset Import Library (Assimp) связана с чтением за границами буфера в памяти при обработке параметра node. Эксплуатация уязвимости может позволить нарушителю получить доступ к конфиденциальной информации путем отправки специально созданного файла

Вендор

Novell Inc.
ООО «Ред Софт»
Red Hat Inc.
Alexander Gessler, Thomas Schulze, Kim Kulling

Наименование ПО

openSUSE Tumbleweed
РЕД ОС
Red Hat Enterprise Linux
Open Asset Import Library (Assimp)

Версия ПО

- (openSUSE Tumbleweed)
7.3 (РЕД ОС)
9 (Red Hat Enterprise Linux)
5.4.3 (Open Asset Import Library (Assimp))

Тип ПО

Операционная система
Прикладное ПО информационных систем

Операционные системы и аппаратные платформы

Novell Inc. openSUSE Tumbleweed -
ООО «Ред Софт» РЕД ОС 7.3
Red Hat Inc. Red Hat Enterprise Linux 9

Уровень опасности уязвимости

Низкий уровень опасности (базовая оценка CVSS 2.0 составляет 2,1)
Низкий уровень опасности (базовая оценка CVSS 3.1 составляет 3,3)
Средний уровень опасности (оценка CVSS 4.0 составляет 4,8)

Возможные меры по устранению уязвимости

Использование рекомендаций:
Для assimp:
https://github.com/assimp/assimp/commit/a0993658f40d8e13ff5823990c30b43c82a5daf0
Для РедОС:
http://repo.red-soft.ru/redos/7.3c/x86_64/updates/
Для программных продуктов Novell Inc.:
https://www.suse.com/security/cve/CVE-2025-3160.html
Для программных продуктов Red Hat Inc.:
https://access.redhat.com/security/cve/cve-2025-3160

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Существует в открытом доступе

Информация об устранении

Уязвимость устранена

EPSS

Процентиль: 5%
0.00021
Низкий

3.3 Low

CVSS3

2.1 Low

CVSS2

Связанные уязвимости

CVSS3: 3.3
ubuntu
8 месяцев назад

A vulnerability has been found in Open Asset Import Library Assimp 5.4.3 and classified as problematic. This vulnerability affects the function Assimp::SceneCombiner::AddNodeHashes of the file code/Common/SceneCombiner.cpp of the component File Handler. The manipulation leads to out-of-bounds read. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The patch is identified as a0993658f40d8e13ff5823990c30b43c82a5daf0. It is recommended to apply a patch to fix this issue.

CVSS3: 3.3
redhat
8 месяцев назад

A vulnerability has been found in Open Asset Import Library Assimp 5.4.3 and classified as problematic. This vulnerability affects the function Assimp::SceneCombiner::AddNodeHashes of the file code/Common/SceneCombiner.cpp of the component File Handler. The manipulation leads to out-of-bounds read. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The patch is identified as a0993658f40d8e13ff5823990c30b43c82a5daf0. It is recommended to apply a patch to fix this issue.

CVSS3: 3.3
nvd
8 месяцев назад

A vulnerability has been found in Open Asset Import Library Assimp 5.4.3 and classified as problematic. This vulnerability affects the function Assimp::SceneCombiner::AddNodeHashes of the file code/Common/SceneCombiner.cpp of the component File Handler. The manipulation leads to out-of-bounds read. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The patch is identified as a0993658f40d8e13ff5823990c30b43c82a5daf0. It is recommended to apply a patch to fix this issue.

CVSS3: 3.3
debian
8 месяцев назад

A vulnerability has been found in Open Asset Import Library Assimp 5.4 ...

CVSS3: 3.3
github
8 месяцев назад

A vulnerability has been found in Open Asset Import Library Assimp 5.4.3 and classified as problematic. This vulnerability affects the function Assimp::SceneCombiner::AddNodeHashes of the file code/Common/SceneCombiner.cpp of the component File Handler. The manipulation leads to out-of-bounds read. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The patch is identified as a0993658f40d8e13ff5823990c30b43c82a5daf0. It is recommended to apply a patch to fix this issue.

EPSS

Процентиль: 5%
0.00021
Низкий

3.3 Low

CVSS3

2.1 Low

CVSS2