Moritz Muehlenhoff wrote:
> Package: blender
> Version: 2.37a-1
> Severity: normal
> Tags: security
> 
> A buffer overflow has been found in the args parsing of blenderplayer.
> This is a minor security problem, as it would need to trick someone
> into playing a file with really quite noticably manipulated file names,
> but has been assigned CAN-2005-3151 by MITRE anyway. A demo exploit
> is available at http://www.securiteam.com/exploits/5BP0T2KGVA.html

Dear Blender maintainers,
is this resolved in current Blender releases? It's only exploitable
in rare corner cases, but still it would be nice to have it fixed in
Etch.

Cheers,
        Moritz


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to