Lucene search

K
gentooGentoo FoundationGLSA-200704-19
HistoryApr 23, 2007 - 12:00 a.m.

Blender: User-assisted remote execution of arbitrary code

2007-04-2300:00:00
Gentoo Foundation
security.gentoo.org
9

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.012 Low

EPSS

Percentile

85.0%

Background

Blender is a 3D creation, animation and publishing program.

Description

Stefan Cornelius of Secunia Research discovered an insecure use of the “eval()” function in kmz_ImportWithMesh.py.

Impact

A remote attacker could entice a user to open a specially crafted Blender file (.kmz or .kml), resulting in the execution of arbitrary Python code with the privileges of the user running Blender.

Workaround

There is no known workaround at this time.

Resolution

All Blender users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=media-gfx/blender-2.43"
OSVersionArchitecturePackageVersionFilename
Gentooanyallmedia-gfx/blender< 2.43UNKNOWN

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.012 Low

EPSS

Percentile

85.0%