CVE-2025-2756

A vulnerability classified as critical has been found in Open Asset Import Library Assimp 5.4.3. This affects the function Assimp::AC3DImporter::ConvertObjectSection of the file code/AssetLib/AC/ACLoader.cpp of the component AC3D File Handler. The manipulation of the argument tmp leads to heap-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
References
Link Resource
https://github.com/assimp/assimp/issues/6018 Exploit Issue Tracking
https://github.com/assimp/assimp/issues/6018#issue-2877375815 Exploit Issue Tracking
https://vuldb.com/?ctiid.300861 Permissions Required VDB Entry
https://vuldb.com/?id.300861 Third Party Advisory VDB Entry
https://vuldb.com/?submit.517790 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:assimp:assimp:5.4.3:*:*:*:*:*:*:*

History

17 Jul 2025, 21:47

Type Values Removed Values Added
CPE cpe:2.3:a:assimp:assimp:5.4.3:*:*:*:*:*:*:*
References () https://github.com/assimp/assimp/issues/6018 - () https://github.com/assimp/assimp/issues/6018 - Exploit, Issue Tracking
References () https://github.com/assimp/assimp/issues/6018#issue-2877375815 - () https://github.com/assimp/assimp/issues/6018#issue-2877375815 - Exploit, Issue Tracking
References () https://vuldb.com/?ctiid.300861 - () https://vuldb.com/?ctiid.300861 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.300861 - () https://vuldb.com/?id.300861 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.517790 - () https://vuldb.com/?submit.517790 - Third Party Advisory, VDB Entry
First Time Assimp assimp
Assimp

27 Mar 2025, 16:45

Type Values Removed Values Added
Summary
  • (es) Se ha detectado una vulnerabilidad crítica en Open Asset Import Library Assimp 5.4.3. Esta afecta a la función Assimp::AC3DImporter::ConvertObjectSection del archivo code/AssetLib/AC/ACLoader.cpp del componente AC3D File Handler. La manipulación del argumento tmp provoca un desbordamiento del búfer en el montón. Es posible iniciar el ataque de forma remota. Se ha hecho público el exploit y puede que sea utilizado.

25 Mar 2025, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-25 10:15

Updated : 2025-07-17 21:47


NVD link : CVE-2025-2756

Mitre link : CVE-2025-2756

CVE.ORG link : CVE-2025-2756


JSON object : View

Products Affected

assimp

  • assimp
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-122

Heap-based Buffer Overflow