Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-12102

Опубликовано: 24 апр. 2018
Источник: debian

Описание

An exploitable integer overflow exists in the way that the Blender open-source 3d creation suite v2.78c converts curves to polygons. A specially crafted .blend file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to open the file or use the file as a library in order to trigger this vulnerability.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
blenderfixed2.79.a+dfsg0-1package
blenderignoredwheezypackage

Примечания

  • https://git.blender.org/gitweb/gitweb.cgi/blender.git/commit/e6df02861e17f75d4dd243776f35208681b78465

  • https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0454

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 8 лет назад

An exploitable integer overflow exists in the way that the Blender open-source 3d creation suite v2.78c converts curves to polygons. A specially crafted .blend file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to open the file or use the file as a library in order to trigger this vulnerability.

CVSS3: 7.8
nvd
почти 8 лет назад

An exploitable integer overflow exists in the way that the Blender open-source 3d creation suite v2.78c converts curves to polygons. A specially crafted .blend file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to open the file or use the file as a library in order to trigger this vulnerability.

CVSS3: 7.8
github
больше 3 лет назад

An exploitable integer overflow exists in the way that the Blender open-source 3d creation suite v2.78c converts curves to polygons. A specially crafted .blend file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to open the file or use the file as a library in order to trigger this vulnerability.

CVSS3: 7.8
fstec
около 8 лет назад

Уязвимость набора программного обеспечения для создания трехмерной компьютерной графики Blender, связанная с целочисленным переполнением при обработке .blend-файла, позволяющая нарушителю выполнить код в контексте приложения