#VU9983 Integer overflow in Blender - CVE-2017-12082
Published: January 12, 2018
Vulnerability identifier: #VU9983
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2017-12082
CWE-ID: CWE-190
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
Blender
Blender
Software vendor:
Blender
Blender
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to integer overflow in the CustomData Mesh loading functionality of the Blender open-source 3d creation suite. A remote attacker can send .blend file with a specially crafted external data file, trick the victim into editing an object within a .blend library in their Scene, trigger memory corruption and execute arbitrary code under the context of the application.
Successful exploitation of the vulnerability may result in system compromise.
The weakness exists due to integer overflow in the CustomData Mesh loading functionality of the Blender open-source 3d creation suite. A remote attacker can send .blend file with a specially crafted external data file, trick the victim into editing an object within a .blend library in their Scene, trigger memory corruption and execute arbitrary code under the context of the application.
Successful exploitation of the vulnerability may result in system compromise.
Remediation
Cybersecurity Help is currently unaware of any solutions addressing the vulnerability.