A vulnerability classified as critical was found in Open Asset Import Library Assimp up to 5.4.3. Affected by this vulnerability is the function read_meshes in the library assimp/code/AssetLib/MDL/HalfLife/HL1MDLLoader.cpp. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The project decided to collect all Fuzzer bugs in a main-issue to address them in the future.
References
Link | Resource |
---|---|
https://github.com/assimp/assimp/issues/6220 | Exploit Issue Tracking Third Party Advisory |
https://github.com/assimp/assimp/issues/6220#issuecomment-2945018579 | Issue Tracking |
https://github.com/user-attachments/files/20605340/read_meshes_reproduce.tar.gz | Exploit |
https://vuldb.com/?ctiid.312589 | Permissions Required |
https://vuldb.com/?id.312589 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.591235 | Third Party Advisory VDB Entry |
Configurations
History
17 Jun 2025, 19:37
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:assimp:assimp:*:*:*:*:*:*:*:* | |
First Time |
Assimp assimp
Assimp |
|
References | () https://github.com/assimp/assimp/issues/6220 - Exploit, Issue Tracking, Third Party Advisory | |
References | () https://github.com/assimp/assimp/issues/6220#issuecomment-2945018579 - Issue Tracking | |
References | () https://github.com/user-attachments/files/20605340/read_meshes_reproduce.tar.gz - Exploit | |
References | () https://vuldb.com/?ctiid.312589 - Permissions Required | |
References | () https://vuldb.com/?id.312589 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.591235 - Third Party Advisory, VDB Entry | |
Summary |
|
16 Jun 2025, 12:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-16 12:15
Updated : 2025-06-17 19:37
NVD link : CVE-2025-6120
Mitre link : CVE-2025-6120
CVE.ORG link : CVE-2025-6120
JSON object : View
Products Affected
assimp
- assimp