Integer overflow in Blender - CVE-2017-2901
Published: January 12, 2018 / Updated: January 12, 2018
Vulnerability identifier: #VU9973
CSH Severity: High
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2017-2901
CWE-ID: CWE-190
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: Blender
Affected software:
Blender
Blender
Detailed vulnerability description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to integer overflow in the IRIS loading functionality of the Blender open-source 3d creation suite. A remote attacker can send a specially crafted .iris file, trick the victim into using it as an asset via the sequencer, trigger memory corruption and execute arbitrary code under the context of the application.
Successful exploitation of the vulnerability may result in system compromise.
The weakness exists due to integer overflow in the IRIS loading functionality of the Blender open-source 3d creation suite. A remote attacker can send a specially crafted .iris file, trick the victim into using it as an asset via the sequencer, trigger memory corruption and execute arbitrary code under the context of the application.
Successful exploitation of the vulnerability may result in system compromise.
How to mitigate CVE-2017-2901
Cybersecurity Help is currently unaware of any solutions addressing the vulnerability.