Description
A segmentation fault (SEGV) was detected in the SortByPTypeProcess::Execute function in the Assimp library during fuzz testing with AddressSanitizer. The crash occurred due to a read access to an invalid memory address (0x1000c9714971).
References (1)
Core 1
Core References
Exploit, Issue Tracking
https://github.com/assimp/assimp/issues/5789
Scores
CVSS v3
6.2
EPSS
0.0004
EPSS Percentile
11.3%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-120
Status
published
Products (1)
assimp/assimp
5.4.3
Published
Oct 24, 2024
Tracked Since
Feb 18, 2026