{"id":"CVE-2025-3196","details":"A vulnerability, which was classified as critical, was found in Open Asset Import Library Assimp 5.4.3. Affected is the function Assimp::MD2Importer::InternReadFile in the library code/AssetLib/MD2/MD2Loader.cpp of the component Malformed File Handler. The manipulation of the argument Name leads to stack-based buffer overflow. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component.","modified":"2026-04-09T10:38:56.669956Z","published":"2025-04-04T02:15:18.627Z","related":["openSUSE-SU-2025:15198-1"],"references":[{"type":"WEB","url":"https://github.com/assimp/assimp/milestone/11"},{"type":"ADVISORY","url":"https://vuldb.com/?id.303150"},{"type":"ADVISORY","url":"https://vuldb.com/?submit.545368"},{"type":"REPORT","url":"https://github.com/assimp/assimp/issues/6069"},{"type":"REPORT","url":"https://github.com/assimp/assimp/issues/6069#issuecomment-2763273425"},{"type":"REPORT","url":"https://vuldb.com/?ctiid.303150"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/assimp/assimp","events":[{"introduced":"0"},{"last_affected":"c35200e38ea8f058812b83de2ef32c6093b0ece2"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"5.4.3"}]}}],"versions":["5.2.0","Release3.1_RC1","v.5.0.0.rc1","v.5.0.0.rc2","v3.1-rc2","v3.1.1","v3.2","v3.3","v3.3.1","v4.0.0","v4.0.0.rc1","v4.1.0","v5.0.0","v5.1.0","v5.1.0.rc1","v5.1.1","v5.1.2","v5.1.3","v5.1.4","v5.1.5","v5.1.6","v5.2.0","v5.2.1","v5.2.2","v5.2.3","v5.2.4","v5.2.5","v5.3.0","v5.3.1","v5.4.0","v5.4.1","v5.4.2","v5.4.3"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-3196.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}