CVE-2005-3151

Source
https://nvd.nist.gov/vuln/detail/CVE-2005-3151
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2005-3151.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2005-3151
Published
2005-10-05T22:02:00Z
Modified
2025-02-08T05:45:27.690647Z
Summary
[none]
Details

Buffer overflow in blenderplay in Blender Player 2.37a allows attackers to execute arbitrary code via a long command line argument.

References

Affected packages

Debian:11 / blender

Package

Name
blender
Purl
pkg:deb/debian/blender?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.83.5+dfsg-5
2.83.5+dfsg-5+deb11u1
2.83.13+dfsg-1
2.83.16+dfsg-1
2.93.2+dfsg-1
2.93.2+dfsg-2
2.93.2+dfsg-3
2.93.2+dfsg-4
2.93.2+dfsg-5
2.93.3+dfsg-1
2.93.3+dfsg-2
2.93.3+dfsg-3
2.93.4+dfsg-1
2.93.4+dfsg-1+riscv64
2.93.4+dfsg-2
2.93.5+dfsg-1

3.*

3.0.0+dfsg-1
3.0.1+dfsg-1
3.0.1+dfsg-2
3.0.1+dfsg-3
3.0.1+dfsg-4
3.0.1+dfsg-5
3.0.1+dfsg-6
3.0.1+dfsg-7
3.1.2+dfsg-1
3.2.2+dfsg-1
3.2.2+dfsg-2
3.2.2+dfsg-3
3.3.1+dfsg-1
3.4.1+dfsg-1
3.4.1+dfsg-2
3.6.2+dfsg-1
3.6.2+dfsg-2

4.*

4.0.2+dfsg-1
4.1.1+dfsg-1
4.1.1+dfsg-2
4.1.1+dfsg-3
4.2.1+dfsg-1
4.2.2+dfsg-1
4.2.3+dfsg-1
4.2.3+dfsg-2
4.2.3+dfsg-3
4.3.0+dfsg-1
4.3.2+dfsg-1
4.3.2+dfsg-2

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:12 / blender

Package

Name
blender
Purl
pkg:deb/debian/blender?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.4.1+dfsg-2
3.6.2+dfsg-1
3.6.2+dfsg-2

4.*

4.0.2+dfsg-1
4.1.1+dfsg-1
4.1.1+dfsg-2
4.1.1+dfsg-3
4.2.1+dfsg-1
4.2.2+dfsg-1
4.2.3+dfsg-1
4.2.3+dfsg-2
4.2.3+dfsg-3
4.3.0+dfsg-1
4.3.2+dfsg-1
4.3.2+dfsg-2

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:13 / blender

Package

Name
blender
Purl
pkg:deb/debian/blender?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.4.1+dfsg-2
3.6.2+dfsg-1
3.6.2+dfsg-2

4.*

4.0.2+dfsg-1
4.1.1+dfsg-1
4.1.1+dfsg-2
4.1.1+dfsg-3
4.2.1+dfsg-1
4.2.2+dfsg-1
4.2.3+dfsg-1
4.2.3+dfsg-2
4.2.3+dfsg-3
4.3.0+dfsg-1
4.3.2+dfsg-1
4.3.2+dfsg-2

Ecosystem specific

{
    "urgency": "unimportant"
}