An exploitable integer overflow exists in the 'CustomData' Mesh loading functionality of the Blender open-source 3d creation suite. A .blend file with a specially crafted external data file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to edit an object within a .blend library in their Scene in order to trigger this vulnerability.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-1465-1 blender security update
Debian DSA Debian DSA DSA-4248-1 blender security update
EUVD EUVD EUVD-2017-3668 An exploitable integer overflow exists in the 'CustomData' Mesh loading functionality of the Blender open-source 3d creation suite. A .blend file with a specially crafted external data file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to edit an object within a .blend library in their Scene in order to trigger this vulnerability.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: talos

Published:

Updated: 2024-09-17T00:06:43.560Z

Reserved: 2017-07-31T00:00:00

Link: CVE-2017-12082

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-04-24T19:29:00.847

Modified: 2024-11-21T03:08:47.670

Link: CVE-2017-12082

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses