7.5
CVSSv2

CVE-2005-4470

Published: 22/12/2005 Updated: 19/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Heap-based buffer overflow in the get_bhead function in readfile.c in Blender BlenLoader 2.0 up to and including 2.40pre allows remote malicious users to cause a denial of service (application crash) and possibly execute arbitrary code via a .blend file with a negative bhead.len value, which causes less memory to be allocated than expected, possibly due to an integer overflow.

Vulnerable Product Search on Vulmon Subscribe to Product

blender blenloader 2.27

blender blenloader 2.28

blender blenloader 2.28a

blender blenloader 2.34

blender blenloader 2.35

blender blenloader 2.25

blender blenloader 2.26

blender blenloader 2.33

blender blenloader 2.33a

blender blenloader

blender blenloader 2.0

blender blenloader 2.04

blender blenloader 2.31a

blender blenloader 2.32

blender blenloader 2.39

blender blenloader 2.40_alpha

blender blenloader 2.28c

blender blenloader 2.30

blender blenloader 2.37

blender blenloader 2.37a

Vendor Advisories

Debian Bug report logs - #344398 CVE-2005-4470: Integer overhead in header parser for blend import Package: blender; Maintainer for blender is Debian Multimedia Maintainers <debian-multimedia@listsdebianorg>; Source for blender is src:blender (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@inutilorg> D ...
Damian Put discovered that Blender did not properly validate a ‘length’ value in blend files Negative values led to an insufficiently sized memory allocation By tricking a user into opening a specially crafted blend file, this could be exploited to execute arbitrary code with the privileges of the Blender user ...