7.5
CVSSv2

CVE-2005-3302

Published: 24/10/2005 Updated: 14/02/2024
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Eval injection vulnerability in bvh_import.py in Blender 2.36 allows malicious users to execute arbitrary Python code via a hierarchy element in a .bvh file, which is supplied to an eval function call.

Vulnerable Product Search on Vulmon Subscribe to Product

blender blender 2.36

debian debian linux 3.1

Vendor Advisories

Debian Bug report logs - #330895 blender [CVE-2005-3302]: Arbitrary code execution when importing a bvh file Package: blender; Maintainer for blender is Debian Multimedia Maintainers <debian-multimedia@listsdebianorg>; Source for blender is src:blender (PTS, buildd, popcon) Reported by: Joxean Koret <joxeankoret@yahoo ...
Debian Bug report logs - #344398 CVE-2005-4470: Integer overhead in header parser for blend import Package: blender; Maintainer for blender is Debian Multimedia Maintainers <debian-multimedia@listsdebianorg>; Source for blender is src:blender (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@inutilorg> D ...

Exploits

source: wwwsecurityfocuscom/bid/17663/info Blender is susceptible to a Python code-execution vulnerability This issue is due to the application's failure to properly sanitize user-supplied input before using it in a Python 'eval' statement This issue allows attackers to execute arbitrary Python code in the context of the user running t ...