Assimp, Out-of-Bounds Read, CVE-2025-3160 (Medium)

Listen to this Post

How CVE-2025-3160 Works

The vulnerability resides in `Assimp::SceneCombiner::AddNodeHashes` within code/Common/SceneCombiner.cpp. When processing 3D asset files, the function fails to properly validate node hierarchy boundaries, leading to an out-of-bounds read. Attackers can craft malicious files triggering memory access beyond allocated buffers, potentially leaking sensitive data or causing crashes. The issue requires local access but could be weaponized in automated workflows.

DailyCVE Form

Platform: Assimp
Version: 5.4.3
Vulnerability: OOB Read
Severity: Medium
Date: 05/28/2025

Prediction: Patch by 06/15/2025

What Undercode Say:

Exploitation

  1. Craft a malformed .fbx/.obj file with oversized node hierarchies.

2. Use `assimp info ` to trigger parsing.

3. Monitor memory leaks via `gdb`:

gdb --args assimp info exploit.obj

Protection

1. Apply patch `a0993658f40d8e13ff5823990c30b43c82a5daf0`.

2. Validate input files with:

import assimp
assimp.tools.verify("file.obj")

Detection

Scan for vulnerable versions:

ldd /usr/bin/assimp | grep "libassimp.so.5.4.3"

Mitigation

1. Use heap hardening:

export GLIBC_TUNABLES=glibc.malloc.check=2

2. Restrict file permissions:

chmod 750 /usr/bin/assimp

Debugging

Enable debug logs:

ASSIMP_LOG_LEVEL=DEBUG assimp info file.obj

References

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top