An exploitable integer overflow exists in the Image loading functionality of the Blender open-source 3d creation suite v2.78c. A specially crafted .blend file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to open the file or use it as a library in order to trigger this vulnerability.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-1465-1 blender security update
Debian DSA Debian DSA DSA-4248-1 blender security update
EUVD EUVD EUVD-2017-12059 An exploitable integer overflow exists in the Image loading functionality of the Blender open-source 3d creation suite v2.78c. A specially crafted .blend file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to open the file or use it as a library in order to trigger this vulnerability.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: talos

Published:

Updated: 2024-09-17T02:47:27.505Z

Reserved: 2016-12-01T00:00:00

Link: CVE-2017-2918

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-04-24T19:29:03.797

Modified: 2024-11-21T03:24:27.430

Link: CVE-2017-2918

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses