Secunia Research Advisory

Blender KML/KMZ Import Command Injection Vulnerability


====================================================================== 

                     Secunia Research 01/03/2007

      - Blender KML/KMZ Import Command Injection Vulnerability -

====================================================================== 
Table of Contents

Affected Software....................................................1
Severity.............................................................2
Vendor's Description of Software.....................................3
Description of Vulnerability.........................................4
Solution.............................................................5
Time Table...........................................................6
Credits..............................................................7
References...........................................................8
About Secunia........................................................9
Verification........................................................10

====================================================================== 
1) Affected Software 

Blender 2.42a

NOTE: Other versions may also be affected.

====================================================================== 
2) Severity 

Rating: Moderately critical
Impact: System access
Where:  From remote

====================================================================== 
3) Vendor's Description of Software 

"Blender is the free open source 3D content creation suite, available
for all major operating systems under the GNU General Public License."

Product Link:
http://www.blender.org/

====================================================================== 
4) Description of Vulnerability

Secunia Research has discovered a vulnerability in Blender, which
can be exploited by malicious people to compromise a user's system.

The vulnerability is caused due to the insecure use of the "eval()"
function in kmz_ImportWithMesh.py. This can be exploited to execute
arbitrary Python commands by tricking a user into importing a
specially crafted "*.kml" or "*.kmz" file.

====================================================================== 
5) Solution 

Update to version 2.43, which no longer includes the affected script.

====================================================================== 
6) Time Table 

19/02/2007 - Vendor notified.
23/02/2007 - Vendor notified again.
23/02/2007 - Vendor response.
03/01/2007 - Public disclosure.

====================================================================== 
7) Credits 

Discovered by Stefan Cornelius, Secunia Research.

====================================================================== 
8) References

The Common Vulnerabilities and Exposures (CVE) project has currently
not assigned a CVE identifier for the vulnerability.

====================================================================== 
9) About Secunia

Secunia offers vulnerability management solutions to corporate
customers with verified and reliable vulnerability intelligence
relevant to their specific system configuration:

https://www.flexera.com/

Secunia also provides a publicly accessible and comprehensive advisory
database as a service to the security community and private 
individuals, who are interested in or concerned about IT-security.

Secunia believes that it is important to support the community and to
do active vulnerability research in order to aid improving the 
security and reliability of software in general.

Secunia regularly hires new skilled team members. Check the URL below
to see currently vacant positions:

https://www.flexera.com/company/careers

Secunia offers a FREE mailing list called Secunia Security Advisories:

https://www.flexera.com/secunia_security_advisories/

====================================================================== 
10) Verification 

Please verify this advisory by visiting the Secunia website:
https://www.flexera.com/about-us/secunia-research/advisories/sr-2007-39.html

Complete list of vulnerability reports published by Secunia Research:
https://www.flexera.com/about-us/secunia-research/advisories/

======================================================================