An exploitable integer overflow exists in the bmp loading functionality of the Blender open-source 3d creation suite version 2.78c. A specially crafted '.bmp' file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to use the file as an asset via the sequencer in order to trigger this vulnerability.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-1465-1 blender security update
Debian DSA Debian DSA DSA-4248-1 blender security update
EUVD EUVD EUVD-2017-12046 An exploitable integer overflow exists in the bmp loading functionality of the Blender open-source 3d creation suite version 2.78c. A specially crafted '.bmp' file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to use the file as an asset via the sequencer in order to trigger this vulnerability.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: talos

Published:

Updated: 2024-09-16T22:25:11.124Z

Reserved: 2016-12-01T00:00:00

Link: CVE-2017-2905

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-04-24T19:29:03.563

Modified: 2024-11-21T03:24:25.897

Link: CVE-2017-2905

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.