CVE-2025-45332

| EUVD-2025-19130 HIGH
2025-06-25 [email protected]
7.5
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None

Lifecycle Timeline

4
Analysis Generated
Mar 15, 2026 - 23:19 vuln.today
EUVD ID Assigned
Mar 15, 2026 - 23:19 euvd
EUVD-2025-19130
PoC Detected
Jul 09, 2025 - 19:07 vuln.today
Public exploit code
CVE Published
Jun 25, 2025 - 18:15 nvd
HIGH 7.5

DescriptionNVD

vkoskiv c-ray 1.1 contains a Null Pointer Dereference (NPD) vulnerability in the parse_mtllib function of its data processing module, leading to unpredictable program behavior, causing segmentation faults, and program crashes.

AnalysisAI

CVE-2025-45332 is a Null Pointer Dereference vulnerability in vkoskiv c-ray 1.1's parse_mtllib function that causes segmentation faults and program crashes. While the CVSS score of 7.5 indicates high severity, the vulnerability results in Availability impact only (crashes) with no confidentiality or integrity compromise, making it primarily a denial-of-service risk rather than an exploitable code execution vulnerability. The network-accessible attack vector (AV:N) and lack of privilege requirements (PR:N) mean remote attackers can trigger crashes without authentication.

Technical ContextAI

C-ray is a ray-tracing renderer that processes material library files (.mtl format) through the parse_mtllib function. The vulnerability stems from CWE-476 (Null Pointer Dereference), a memory safety defect where the application dereferences a null pointer without proper validation. The parse_mtllib function likely fails to validate pointers returned from memory allocation, string parsing, or file I/O operations before dereferencing them. This is typical in C-based graphics processing tools that handle external file formats. The affected component processes Material Template Library files, which are text-based format specifications commonly used in 3D graphics workflows alongside OBJ model files.

RemediationAI

monitor the official c-ray repository (https://github.com/vkoskiv/c-ray) for security updates or contact the maintainer directly.; priority: High

Share

CVE-2025-45332 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy