A segmentation fault (SEGV) was detected in the SortByPTypeProcess::Execute function in the Assimp library during fuzz testing with AddressSanitizer. The crash occurred due to a read access to an invalid memory address (0x1000c9714971).
Metrics
Affected Vendors & Products
References
History
Tue, 29 Oct 2024 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Assimp
Assimp assimp |
|
Weaknesses | CWE-120 | |
CPEs | cpe:2.3:a:assimp:assimp:5.4.3:*:*:*:*:*:*:* | |
Vendors & Products |
Assimp
Assimp assimp |
|
Metrics |
ssvc
|
Fri, 25 Oct 2024 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-122 | |
Metrics |
cvssV3_1
|
Fri, 25 Oct 2024 02:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | assimp: SEGV in SortByPTypeProcess::Execute | |
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Thu, 24 Oct 2024 21:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A segmentation fault (SEGV) was detected in the SortByPTypeProcess::Execute function in the Assimp library during fuzz testing with AddressSanitizer. The crash occurred due to a read access to an invalid memory address (0x1000c9714971). | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-10-29T19:24:29.174Z
Reserved: 2024-10-08T00:00:00
Link: CVE-2024-48426

Updated: 2024-10-29T19:24:22.086Z

Status : Awaiting Analysis
Published: 2024-10-24T21:15:14.387
Modified: 2024-10-29T20:35:31.967
Link: CVE-2024-48426
