First published: Thu Oct 24 2024(Updated: )
A segmentation fault (SEGV) was detected in the Assimp::SplitLargeMeshesProcess_Triangle::UpdateNode function within the Assimp library during fuzz testing using AddressSanitizer. The crash occurs due to a read access violation at address 0x000000000460, which points to the zero page, indicating a null or invalid pointer dereference.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Assimp |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-48425 has been categorized with a severity level that indicates a potential crash due to a segmentation fault in the Assimp library.
To mitigate CVE-2024-48425, it is recommended to upgrade to the latest version of the Assimp library where the vulnerability has been addressed.
CVE-2024-48425 affects the Assimp library but specific version details should be checked in the release notes or vulnerability advisories.
CVE-2024-48425 can lead to application crashes, potentially impacting availability and reliability if the Assimp library is utilized.
CVE-2024-48425 may share characteristics with other vulnerabilities in Assimp, particularly those related to memory access violations during processing.