CVE-2025-3196

Source
https://cve.org/CVERecord?id=CVE-2025-3196
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-3196.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-3196
Aliases
Downstream
Related
Published
2025-04-04T01:00:12.961Z
Modified
2026-05-20T18:26:38.714455159Z
Severity
  • 1.9 (Low) CVSS_V4 - CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P CVSS Calculator
Summary
Open Asset Import Library Assimp Malformed File MD2Loader.cpp InternReadFile stack-based overflow
Details

A vulnerability, which was classified as critical, was found in Open Asset Import Library Assimp 5.4.3. Affected is the function Assimp::MD2Importer::InternReadFile in the library code/AssetLib/MD2/MD2Loader.cpp of the component Malformed File Handler. The manipulation of the argument Name leads to stack-based buffer overflow. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/3xxx/CVE-2025-3196.json",
    "cna_assigner": "VulDB",
    "cwe_ids": [
        "CWE-119",
        "CWE-121"
    ]
}
References

Affected packages

Git / github.com/assimp/assimp

Affected ranges

Type
GIT
Repo
https://github.com/assimp/assimp
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Database specific
{
    "source": "AFFECTED_FIELD",
    "extracted_events": [
        {
            "introduced": "0"
        },
        {
            "last_affected": "5.4.3"
        }
    ]
}

Affected versions

5.*
5.2.0
Release3.*
Release3.1_RC1
v.*
v.5.0.0.rc1
v.5.0.0.rc2
v3.*
v3.1-rc2
v3.1.1
v3.2
v3.3
v3.3.1
v4.*
v4.0.0
v4.0.0.rc1
v4.1.0
v5.*
v5.0.0
v5.1.0
v5.1.0.rc1
v5.1.1
v5.1.2
v5.1.3
v5.1.4
v5.1.5
v5.1.6
v5.2.0
v5.2.1
v5.2.2
v5.2.3
v5.2.4
v5.2.5
v5.3.0
v5.3.1
v5.4.0
v5.4.1
v5.4.2
v5.4.3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-3196.json"