blob: b3d2176e54a54e55a155cf79376d4e11698314b1 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200704-19">
<title>Blender: User-assisted remote execution of arbitrary code</title>
A vulnerability has been discovered in Blender allowing for user-assisted
arbitrary code execution.
<product type="ebuild">Blender</product>
<announced>April 23, 2007</announced>
<revised>April 23, 2007: 01</revised>
<package name="media-gfx/blender" auto="yes" arch="*">
<unaffected range="ge">2.43</unaffected>
<vulnerable range="lt">2.43</vulnerable>
Blender is a 3D creation, animation and publishing program.
Stefan Cornelius of Secunia Research discovered an insecure use of the
"eval()" function in
<impact type="normal">
A remote attacker could entice a user to open a specially crafted
Blender file (.kmz or .kml), resulting in the execution of arbitrary
Python code with the privileges of the user running Blender.
There is no known workaround at this time.
All Blender users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/blender-2.43&quot;</code>
<uri link="">CVE-2007-1253</uri>
<metadata tag="requester" timestamp="Tue, 17 Apr 2007 18:07:32 +0000">
<metadata tag="submitter" timestamp="Wed, 18 Apr 2007 09:36:27 +0000">
<metadata tag="bugReady" timestamp="Wed, 18 Apr 2007 20:46:11 +0000">