CVE-2017-12103

NameCVE-2017-12103
DescriptionAn exploitable integer overflow exists in the way that the Blender open-source 3d creation suite v2.78c converts text rendered as a font into a curve. A specially crafted .blend file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to open the file or use the file as a library in order to trigger this vulnerability.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-1465-1, DSA-4248-1
NVD severitymedium (attack range: remote)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
blender (PTS)jessie2.72.b+dfsg0-3vulnerable
jessie (security)2.72.b+dfsg0-3+deb8u1fixed
stretch2.78.a+dfsg0-4vulnerable
stretch (security)2.79.b+dfsg0-1~deb9u1fixed
buster, sid2.79.b+dfsg0-4fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
blendersource(unstable)2.79.a+dfsg0-1medium
blendersourcejessie2.72.b+dfsg0-3+deb8u1mediumDLA-1465-1
blendersourcestretch2.79.b+dfsg0-1~deb9u1mediumDSA-4248-1

Notes

[wheezy] - blender <ignored> (Vulnerable but not ignored)
https://git.blender.org/gitweb/gitweb.cgi/blender.git/commit/e6df02861e17f75d4dd243776f35208681b78465
https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0455

Search for package or bug name: Reporting problems