blob: c533c069265f8883357ed5fd9509fc77756e6c69 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200601-08">
<title>Blender: Heap-based buffer overflow</title>
Blender is vulnerable to a buffer overflow that may be exploited by
attackers to execute arbitrary code.
<product type="ebuild">blender</product>
<announced>January 13, 2006</announced>
<revised>January 13, 2006: 01</revised>
<package name="media-gfx/blender" auto="yes" arch="*">
<unaffected range="ge">2.40</unaffected>
<vulnerable range="lt">2.40</vulnerable>
Blender is an open source software for 3D modeling, animation,
rendering, post-production, interactive creation and playback.
Damian Put has reported a flaw due to an integer overflow in the
"get_bhead()" function, leading to a heap overflow when processing
malformed ".blend" files.
<impact type="normal">
A remote attacker could entice a user into opening a specially
crafted ".blend" file, resulting in the execution of arbitrary code
with the permissions of the user running Blender.
There is no known workaround at this time.
All Blender users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/blender-2.40&quot;</code>
<uri link="">CVE-2005-4470</uri>
<metadata tag="requester" timestamp="Tue, 10 Jan 2006 19:17:22 +0000">
<metadata tag="bugReady" timestamp="Tue, 10 Jan 2006 19:17:39 +0000">
<metadata tag="submitter" timestamp="Wed, 11 Jan 2006 01:12:10 +0000">