First published: Fri Dec 31 2021(Updated: )
Open Asset Import Library (aka assimp) 5.1.0 and 5.1.1 has a heap-based buffer overflow in _m3d_safestr (called from m3d_load and Assimp::M3DWrapper::M3DWrapper).
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Assimp | =5.1.0 | |
Assimp | =5.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for the Open Asset Import Library (assimp) heap-based buffer overflow is CVE-2021-45948.
The severity of CVE-2021-45948 is medium, with a severity value of 5.5.
Versions 5.1.0 and 5.1.1 of assimp are affected by CVE-2021-45948.
To fix the heap-based buffer overflow vulnerability in assimp, it is recommended to update to a patched version of assimp, if available.
You can find more information about CVE-2021-45948 in the following references: [link1](https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=34416), [link2](https://github.com/google/oss-fuzz-vulns/blob/main/vulns/assimp/OSV-2021-775.yaml), [link3](https://security.gentoo.org/glsa/202210-01).