First published: Tue Apr 24 2018(Updated: )
An exploitable integer overflow exists in the 'CustomData' Mesh loading functionality of the Blender open-source 3d creation suite. A .blend file with a specially crafted external data file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to edit an object within a .blend library in their Scene in order to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/blender | 2.79.b+dfsg0-7+deb10u1 2.83.5+dfsg-5+deb11u1 3.4.1+dfsg-2 3.6.2+dfsg-2 | |
Blender Blender | =2.78c | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-12082 is an integer overflow vulnerability in the CustomData Mesh loading functionality of the Blender open-source 3D creation suite.
CVE-2017-12082 has a severity rating of 7.8, which is considered high.
The Blender package versions 2.79.b+dfsg0-7+deb10u1, 2.83.5+dfsg-5+deb11u1, 3.4.1+dfsg-2, and 3.6.2+dfsg-2 are affected. Additionally, Blender version 2.78c and Debian Linux versions 8.0 and 9.0 are also affected.
An attacker can exploit CVE-2017-12082 by crafting a specially crafted external data file in a .blend file, which triggers an integer overflow and leads to a buffer overflow. This can potentially allow the attacker to execute arbitrary code.
To fix CVE-2017-12082, it is recommended to update your Blender package or Debian Linux to the specified fixed versions: 2.79.b+dfsg0-7+deb10u1, 2.83.5+dfsg-5+deb11u1, 3.4.1+dfsg-2, 3.6.2+dfsg-2, or apply the corresponding security patches provided by Debian.