CVE-2025-2151

A vulnerability classified as critical was found in Open Asset Import Library Assimp 5.4.3. This vulnerability affects the function Assimp::GetNextLine in the library ParsingUtils.h of the component File Handler. The manipulation leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
References
Link Resource
https://github.com/assimp/assimp/issues/6016 Exploit Issue Tracking Vendor Advisory
https://github.com/assimp/assimp/issues/6026 Exploit Issue Tracking Vendor Advisory
https://github.com/sae-as-me/Crashes/raw/refs/heads/main/assimp/assimp_crash_1 Broken Link
https://vuldb.com/?ctiid.299062 Permissions Required VDB Entry
https://vuldb.com/?id.299062 Third Party Advisory VDB Entry
https://vuldb.com/?submit.510582 Third Party Advisory VDB Entry
https://github.com/assimp/assimp/issues/6016 Exploit Issue Tracking Vendor Advisory
https://github.com/assimp/assimp/issues/6026 Exploit Issue Tracking Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:assimp:assimp:5.4.3:*:*:*:*:*:*:*

History

28 May 2025, 18:28

Type Values Removed Values Added
CWE CWE-787
CPE cpe:2.3:a:assimp:assimp:5.4.3:*:*:*:*:*:*:*
First Time Assimp assimp
Assimp
References () https://github.com/assimp/assimp/issues/6016 - () https://github.com/assimp/assimp/issues/6016 - Exploit, Issue Tracking, Vendor Advisory
References () https://github.com/assimp/assimp/issues/6026 - () https://github.com/assimp/assimp/issues/6026 - Exploit, Issue Tracking, Vendor Advisory
References () https://github.com/sae-as-me/Crashes/raw/refs/heads/main/assimp/assimp_crash_1 - () https://github.com/sae-as-me/Crashes/raw/refs/heads/main/assimp/assimp_crash_1 - Broken Link
References () https://vuldb.com/?ctiid.299062 - () https://vuldb.com/?ctiid.299062 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.299062 - () https://vuldb.com/?id.299062 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.510582 - () https://vuldb.com/?submit.510582 - Third Party Advisory, VDB Entry
Summary
  • (es) Se ha encontrado una vulnerabilidad clasificada como crítica en Open Asset Import Library Assimp 5.4.3. Esta vulnerabilidad afecta a la función Assimp::GetNextLine en la librería ParsingUtils.h del componente File Handler. La manipulación provoca un desbordamiento del búfer basado en la pila. El ataque puede iniciarse de forma remota. Se ha hecho público el exploit y puede que sea utilizado.

10 Mar 2025, 14:15

Type Values Removed Values Added
References () https://github.com/assimp/assimp/issues/6016 - () https://github.com/assimp/assimp/issues/6016 -
References () https://github.com/assimp/assimp/issues/6026 - () https://github.com/assimp/assimp/issues/6026 -

10 Mar 2025, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-10 13:15

Updated : 2025-05-28 18:28


NVD link : CVE-2025-2151

Mitre link : CVE-2025-2151

CVE.ORG link : CVE-2025-2151


JSON object : View

Products Affected

assimp

  • assimp
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-121

Stack-based Buffer Overflow

CWE-787

Out-of-bounds Write