Metrics
Affected Vendors & Products
Wed, 28 May 2025 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Assimp
Assimp assimp |
|
Weaknesses | CWE-787 | |
CPEs | cpe:2.3:a:assimp:assimp:5.4.3:*:*:*:*:*:*:* | |
Vendors & Products |
Assimp
Assimp assimp |
Fri, 04 Apr 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 04 Apr 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Fri, 04 Apr 2025 01:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability, which was classified as critical, was found in Open Asset Import Library Assimp 5.4.3. Affected is the function Assimp::MD2Importer::InternReadFile in the library code/AssetLib/MD2/MD2Loader.cpp of the component Malformed File Handler. The manipulation of the argument Name leads to stack-based buffer overflow. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. | |
Title | Open Asset Import Library Assimp Malformed File MD2Loader.cpp InternReadFile stack-based overflow | |
Weaknesses | CWE-119 CWE-121 |
|
References |
| |
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published: 2025-04-04T01:00:12.961Z
Updated: 2025-04-04T20:21:14.303Z
Reserved: 2025-04-03T10:58:31.836Z
Link: CVE-2025-3196

Updated: 2025-04-04T14:26:21.228Z

Status : Analyzed
Published: 2025-04-04T02:15:18.627
Modified: 2025-05-28T14:24:30.580
Link: CVE-2025-3196
