An exploitable integer overflow exists in the way that the Blender open-source 3d creation suite v2.78c converts curves to polygons. A specially crafted .blend file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to open the file or use the file as a library in order to trigger this vulnerability.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-1465-1 blender security update
Debian DSA Debian DSA DSA-4248-1 blender security update
EUVD EUVD EUVD-2017-3686 An exploitable integer overflow exists in the way that the Blender open-source 3d creation suite v2.78c converts curves to polygons. A specially crafted .blend file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to open the file or use the file as a library in order to trigger this vulnerability.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: talos

Published:

Updated: 2024-09-16T16:54:15.396Z

Reserved: 2017-07-31T00:00:00

Link: CVE-2017-12102

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-04-24T19:29:01.190

Modified: 2024-11-21T03:08:50.013

Link: CVE-2017-12102

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses