Blender: Heap-based buffer overflow
Gentoo Linux Security Advisory
||GLSA 200601-08 / blender
||January 13, 2006
||January 13, 2006: 01
All supported architectures
Blender is vulnerable to a buffer overflow that may be exploited by
attackers to execute arbitrary code.
Blender is an open source software for 3D modeling, animation,
rendering, post-production, interactive creation and playback.
Damian Put has reported a flaw due to an integer overflow in the
"get_bhead()" function, leading to a heap overflow when processing
malformed ".blend" files.
A remote attacker could entice a user into opening a specially
crafted ".blend" file, resulting in the execution of arbitrary code
with the permissions of the user running Blender.
There is no known workaround at this time.
All Blender users should upgrade to the latest version:
Code Listing 3.1: Resolution
# emerge --sync
# emerge --ask --oneshot --verbose ">=media-gfx/blender-2.40"