First published: Tue Apr 24 2018(Updated: )
An exploitable integer overflow exists in the DPX loading functionality of the Blender open-source 3d creation suite version 2.78c. A specially crafted '.cin' file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to use the file as an asset via the sequencer in order to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/blender | 2.79.b+dfsg0-7+deb10u1 2.83.5+dfsg-5+deb11u1 3.4.1+dfsg-2 3.6.2+dfsg-2 | |
Blender Blender | =2.78c | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this exploit is CVE-2017-2902.
The severity of CVE-2017-2902 is high with a CVSS score of 7.8.
The integer overflow vulnerability in Blender version 2.78c occurs in the DPX loading functionality when processing a specially crafted '.cin' file.
An attacker can exploit this vulnerability to cause a buffer overflow and potentially execute arbitrary code within the context of the Blender application.
Blender version 2.78c and Debian Linux versions 8.0 and 9.0 are affected by CVE-2017-2902.