一、 漏洞 CVE-2025-2152 基础信息
漏洞标题
Open Asset Import Library Assimp File BaseImporter.cpp ConvertToUTF8 堆溢出漏洞
来源:AIGC 神龙大模型
漏洞描述信息
在Open Asset Import Library Assimp 5.4.3中发现了一个被分类为 critical(严重)的漏洞。该问题影响组件File Handler中的文件BaseImporter.cpp里的函数Assimp::BaseImporter::ConvertToUTF8。此漏洞可能导致基于堆的缓冲区溢出。攻击者可能远程发起此攻击。该漏洞的利用代码已经公开并可能被利用。
来源:AIGC 神龙大模型
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
来源:AIGC 神龙大模型
漏洞类别
跨界内存写
来源:AIGC 神龙大模型
漏洞标题
Open Asset Import Library Assimp File BaseImporter.cpp ConvertToUTF8 heap-based overflow
来源:美国国家漏洞数据库 NVD
漏洞描述信息
A vulnerability, which was classified as critical, has been found in Open Asset Import Library Assimp 5.4.3. This issue affects the function Assimp::BaseImporter::ConvertToUTF8 of the file BaseImporter.cpp of the component File Handler. The manipulation leads to heap-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
来源:美国国家漏洞数据库 NVD
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
来源:美国国家漏洞数据库 NVD
漏洞类别
堆缓冲区溢出
来源:美国国家漏洞数据库 NVD
二、漏洞 CVE-2025-2152 的公开POC
# POC 描述 源链接 神龙链接
三、漏洞 CVE-2025-2152 的情报信息
  • 标题: Bug: Heap-based Buffer Overflow in Assimp::BaseImporter::ConvertToUTF8 · Issue #6027 · assimp/assimp -- 🔗来源链接

    标签: issue-tracking

  • 标题: Bug: Heap-based Buffer Overflow in Assimp::BaseImporter::ConvertToUTF8 · Issue #6027 · assimp/assimp -- 🔗来源链接

    标签: exploit issue-tracking

  • 标题: Login required -- 🔗来源链接

    标签: signature permissions-required

  • 标题: Submit #510818: https://github.com/assimp/assimp assimp v5.4.3 Heap-based Buffer Overflow -- 🔗来源链接

    标签: third-party-advisory

  • 标题: CVE-2025-2152 Open Asset Import Library Assimp File BaseImporter.cpp ConvertToUTF8 heap-based overflow (Issue 6027) -- 🔗来源链接

    标签: vdb-entry technical-description

  • https://nvd.nist.gov/vuln/detail/CVE-2025-2152