Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-12104

Опубликовано: 24 апр. 2018
Источник: debian

Описание

An exploitable integer overflow exists in the way that the Blender open-source 3d creation suite v2.78c draws a Particle object. A specially crafted .blend file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to open the file or use the file as a library in order to trigger this vulnerability.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
blenderfixed2.79.a+dfsg0-1package
blenderignoredwheezypackage

Примечания

  • https://git.blender.org/gitweb/gitweb.cgi/blender.git/commit/e6df02861e17f75d4dd243776f35208681b78465

  • https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0456

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 8 лет назад

An exploitable integer overflow exists in the way that the Blender open-source 3d creation suite v2.78c draws a Particle object. A specially crafted .blend file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to open the file or use the file as a library in order to trigger this vulnerability.

CVSS3: 7.8
nvd
почти 8 лет назад

An exploitable integer overflow exists in the way that the Blender open-source 3d creation suite v2.78c draws a Particle object. A specially crafted .blend file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to open the file or use the file as a library in order to trigger this vulnerability.

CVSS3: 7.8
github
больше 3 лет назад

An exploitable integer overflow exists in the way that the Blender open-source 3d creation suite v2.78c draws a Particle object. A specially crafted .blend file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to open the file or use the file as a library in order to trigger this vulnerability.

CVSS3: 8.8
fstec
почти 8 лет назад

Уязвимость компонента Particle набора программного обеспечения для создания трехмерной компьютерной графики Blender, позволяющая нарушителю выполнить произвольный код