<Vulnerability name="CVE-2025-70067">
    <DocumentDistribution xml:lang="en">Copyright © 2012 Red Hat, Inc. All rights reserved.</DocumentDistribution>
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2026-05-04T00:00:00</PublicDate>
    <Bugzilla id="2465308" url="https://bugzilla.redhat.com/show_bug.cgi?id=2465308" xml:lang="en:us">
Assimp: Assimp: Buffer overflow in FBX Importer allows arbitrary code execution via crafted file.
    </Bugzilla>
    <CVSS3 status="draft">
        <CVSS3BaseScore>5.6</CVSS3BaseScore>
        <CVSS3ScoringVector>CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:L</CVSS3ScoringVector>
    </CVSS3>
    <CWE>CWE-120</CWE>
    <Details xml:lang="en:us" source="Mitre">
Buffer Overflow vulnerability exists in Assimp versions up to 6.0.2 in the FBX Importer. The vulnerability occurs in aiMaterial::AddBinaryProperty, where a property key string from a crafted FBX file is copied into a fixed-size heap buffer using strcpy() without runtime length validation
    </Details>
    <Details xml:lang="en:us" source="Red Hat">
A flaw was found in Assimp, an open-source asset import library, specifically within its FBX Importer. This buffer overflow vulnerability occurs when processing a specially crafted FBX file. An attacker could exploit this by providing a malicious FBX file, causing a property key string to be copied into a fixed-size memory buffer without proper length validation. This could lead to a denial of service or potentially arbitrary code execution, allowing an attacker to run unauthorized commands.
    </Details>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:10">
        <ProductName>Red Hat Enterprise Linux 10</ProductName>
        <FixState>Fix deferred</FixState>
        <PackageName>qt6-qtquick3d</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:9">
        <ProductName>Red Hat Enterprise Linux 9</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>qt5-qt3d</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2025-70067
https://nvd.nist.gov/vuln/detail/CVE-2025-70067
http://assimp.com
https://gist.github.com/GunP4ng/b6653184a4c5c3e608e6368227397505
https://github.com/assimp/assimp
    </References>
</Vulnerability>