------------------------------------------------------------------------ Pardus Linux Security Advisory 2008-66 security@pardus.org.tr ------------------------------------------------------------------------ Date: 2008-11-07 Severity: 2 Type: Local ------------------------------------------------------------------------ Summary ======= Untrusted search path vulnerability in BPY_interface in Blender 2.46 allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to an erroneous setting of sys.path by the PySys_SetArgv function. Description =========== This vulnerability provides administrator access, Allows complete confidentiality, integrity, and availability violation; Allows unauthorized disclosure of information; Allows disruption of service. Affected packages: Pardus 2008: blender, all before 2.47-14-3 Resolution ========== There are update(s) for blender. You can update them via Package Manager or with a single command from console: pisi up blender References ========== * http://bugs.pardus.org.tr/show_bug.cgi?id=8579 * http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=503632 * http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-4863 ------------------------------------------------------------------------ -- Pardus Security Team http://security.pardus.org.tr _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/