Description
A segmentation fault (SEGV) was detected in the Assimp::SplitLargeMeshesProcess_Triangle::UpdateNode function within the Assimp library during fuzz testing using AddressSanitizer. The crash occurs due to a read access violation at address 0x000000000460, which points to the zero page, indicating a null or invalid pointer dereference.
References (1)
Core 1
Core References
Exploit, Issue Tracking, Vendor Advisory
https://github.com/assimp/assimp/issues/5791
Scores
CVSS v3
5.5
EPSS
0.0008
EPSS Percentile
22.4%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-120
Status
published
Products (1)
assimp/assimp
5.4.3
Published
Oct 24, 2024
Tracked Since
Feb 18, 2026