CVE-2008-1102
Gentoo Linux Security Advisory 201311-07
Severity Score
7.8
*CVSS v3
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Stack-based buffer overflow in the imb_loadhdr function in Blender 2.45 allows user-assisted remote attackers to execute arbitrary code via a .blend file that contains a crafted Radiance RGBE image.
Desbordamiento de búfer basado en pila en la función imb_loadhdr de Blender 2.45 permite a atacantes remotos asistidos por el usuario ejecutar código de su elección a través de un fichero .blend que contiene imágenes Radiance RGBE manipuladas.
Multiple vulnerabilities have been found in Blender, the worst of which could allow attackers to execute arbitrary code. Versions less than 2.49b-r2 are affected.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2008-02-29 CVE Reserved
- 2008-04-21 CVE Published
- 2024-08-07 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (15)
URL | Tag | Source |
---|---|---|
http://secunia.com/advisories/29957 | Third Party Advisory | |
http://secunia.com/advisories/30097 | Third Party Advisory | |
http://secunia.com/advisories/30151 | Third Party Advisory | |
http://secunia.com/advisories/30272 | Third Party Advisory | |
http://www.securityfocus.com/bid/28870 | Vdb Entry | |
http://www.vupen.com/english/advisories/2008/1308/references | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/41917 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|