Description
An exploitable integer overflow exists in the IRIS loading functionality of the Blender open-source 3d creation suite version 2.78c. A specially crafted '.iris' file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to use the file as an asset via the sequencer in order to trigger this vulnerability.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1465-1 | blender security update |
Debian DSA |
DSA-4248-1 | blender security update |
EUVD |
EUVD-2017-12042 | An exploitable integer overflow exists in the IRIS loading functionality of the Blender open-source 3d creation suite version 2.78c. A specially crafted '.iris' file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to use the file as an asset via the sequencer in order to trigger this vulnerability. |
References
History
No history.
Status: PUBLISHED
Assigner: talos
Published:
Updated: 2024-09-16T19:00:46.815Z
Reserved: 2016-12-01T00:00:00.000Z
Link: CVE-2017-2901
No data.
Status : Modified
Published: 2018-04-24T19:29:03.173
Modified: 2024-11-21T03:24:25.417
Link: CVE-2017-2901
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD