First published: Tue Apr 24 2018(Updated: )
An exploitable integer overflow exists in the way that the Blender open-source 3d creation suite v2.78c applies a particular object modifier to a Mesh. A specially crafted .blend file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to open the file or use the file as a library in order to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/blender | 2.79.b+dfsg0-7+deb10u1 2.83.5+dfsg-5+deb11u1 3.4.1+dfsg-2 3.6.2+dfsg-2 | |
Blender Blender | =2.78c | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-12105 is an integer overflow vulnerability in Blender that can result in code execution.
CVE-2017-12105 has a severity rating of 7.8, which is considered high.
The affected software includes Blender v2.78c, Blender v2.79.b+dfsg0-7+deb10u1, Blender v2.83.5+dfsg-5+deb11u1, Blender v3.4.1+dfsg-2, Blender v3.6.2+dfsg-2, and Debian Linux versions 8.0 and 9.0.
To fix CVE-2017-12105, update your Blender installation to one of the patched versions provided and make sure your Debian Linux system is up to date.
You can find more information about CVE-2017-12105 at the following references: - [Blender Git Commit](https://git.blender.org/gitweb/gitweb.cgi/blender.git/commit/e04d7c49dca9dc7bbf1cbe446b612aaa5ba12581) - [Talos Intelligence Vulnerability Report](https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0457) - [Debian Security Tracker](https://security-tracker.debian.org/tracker/CVE-2017-12105)