9 lines
No EOL
617 B
Text
9 lines
No EOL
617 B
Text
source: http://www.securityfocus.com/bid/17663/info
|
|
|
|
Blender is susceptible to a Python code-execution vulnerability. This issue is due to the application's failure to properly sanitize user-supplied input before using it in a Python 'eval' statement.
|
|
|
|
This issue allows attackers to execute arbitrary Python code in the context of the user running the affected application.
|
|
|
|
http://bugs.debian.org/cgi-bin/bugreport.cgi/exploit.bvh?bug=330895;msg=5;att=1
|
|
http://bugs.debian.org/cgi-bin/bugreport.cgi/poc1.bvh?bug=330895;msg=5;att=3
|
|
http://bugs.debian.org/cgi-bin/bugreport.cgi/poc2.bvh?bug=330895;msg=5;att=4 |