Vulnerability Description
An exploitable integer overflow exists in the upgrade of a legacy Mesh attribute of the Blender open-source 3d creation suite v2.78c. A specially crafted .blend file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to open the file or use it as a library in order to trigger this vulnerability.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Blender | Blender | 2.78c |
| Debian | Debian Linux | 8.0 |
Related Weaknesses (CWE)
References
- https://lists.debian.org/debian-lts-announce/2018/08/msg00011.htmlMailing ListThird Party Advisory
- https://www.debian.org/security/2018/dsa-4248Mailing ListThird Party Advisory
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0433ExploitThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2018/08/msg00011.htmlMailing ListThird Party Advisory
- https://www.debian.org/security/2018/dsa-4248Mailing ListThird Party Advisory
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0433ExploitThird Party Advisory
FAQ
What is CVE-2017-12081?
CVE-2017-12081 is a vulnerability with a CVSS score of 7.8 (HIGH). An exploitable integer overflow exists in the upgrade of a legacy Mesh attribute of the Blender open-source 3d creation suite v2.78c. A specially crafted .blend file can cause an integer overflow resu...
How severe is CVE-2017-12081?
CVE-2017-12081 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-12081?
Check the references section above for vendor advisories and patch information. Affected products include: Blender Blender, Debian Debian Linux.