An exploitable integer overflow exists in the 'BKE_mesh_calc_normals_tessface' functionality of the Blender open-source 3d creation suite. A specially crafted .blend file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to open a .blend file in order to trigger this vulnerability.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-1465-1 blender security update
Debian DSA Debian DSA DSA-4248-1 blender security update
EUVD EUVD EUVD-2017-3672 An exploitable integer overflow exists in the 'BKE_mesh_calc_normals_tessface' functionality of the Blender open-source 3d creation suite. A specially crafted .blend file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to open a .blend file in order to trigger this vulnerability.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: talos

Published:

Updated: 2024-09-16T18:59:05.378Z

Reserved: 2017-07-31T00:00:00

Link: CVE-2017-12086

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-04-24T19:29:00.907

Modified: 2024-11-21T03:08:48.160

Link: CVE-2017-12086

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses