
Cloud Vulnerability DB
A community-led vulnerabilities database
A segmentation fault (SEGV) vulnerability was discovered in the Assimp::SplitLargeMeshesProcess_Triangle::UpdateNode function within the Assimp library (version 5.4.3). The vulnerability was identified during fuzz testing using AddressSanitizer, where a read access violation occurs at address 0x000000000460, pointing to the zero page, indicating a null or invalid pointer dereference (Github Issue, NVD).
The vulnerability occurs in the SplitLargeMeshesProcess_Triangle::UpdateNode function at line 105 of SplitLargeMeshes.cpp. The issue manifests during the post-processing step when splitting large meshes into smaller parts, specifically during the node update process. The CVSS v3.1 base score is 5.5 (Medium) with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H, indicating local access requirements and potential high impact on availability (NVD).
The vulnerability can lead to denial of service (DoS) in applications using Assimp for processing 3D models. When triggered by maliciously crafted 3D model files during the mesh splitting process, the application crashes due to invalid memory access (Github Issue).
The vulnerability affects multiple versions of the software across different distributions, including Debian's bullseye, bookworm, trixie, and sid releases. Currently marked as vulnerable with no immediate fix available (Debian Tracker).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."