First published: Tue Apr 24 2018(Updated: )
An exploitable integer overflow exists in the PNG loading functionality of the Blender open-source 3d creation suite version 2.78c. A specially crafted '.png' file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to use the file as an asset via the sequencer in order to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/blender | 2.79.b+dfsg0-7+deb10u1 2.83.5+dfsg-5+deb11u1 3.4.1+dfsg-2 3.6.2+dfsg-2 | |
Blender Blender | =2.78c | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-2900 is an integer overflow vulnerability in the PNG loading functionality of the Blender open-source 3D creation suite, which can lead to a buffer overflow and code execution.
CVE-2017-2900 has a severity value of 7.8, classified as high.
CVE-2017-2900 affects Blender versions 2.78c, 2.79.b+dfsg0-7+deb10u1, 2.83.5+dfsg-5+deb11u1, 3.4.1+dfsg-2, and 3.6.2+dfsg-2.
To fix CVE-2017-2900, users should update Blender to version 2.83.5+dfsg-5+deb11u1 or later.
More information about CVE-2017-2900 can be found at the following references: [Link 1](https://git.blender.org/gitweb/gitweb.cgi/blender.git/commit/d30cc1ea0b9ba64d8a1e22105528b6cb8077692c), [Link 2](https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0407), [Link 3](https://security-tracker.debian.org/tracker/CVE-2017-2900)