On Tue, Jun 4, 2013 at 7:58 PM, David Jeske <dav...@gmail.com> wrote:
> The decision at the time was that no, we do not. Also note that even
>> disabling scripts does not make Blender secure, there's dozens of
>> other ways to create malicious .blend files.
>>
>
> What are the other "dozen" ways blender could
> read/destroy/send-files-to-the-internet/install-viruses with python scripts
> disabled?

Some examples:

* Animation rendering, compositor file output node, point caches, etc
all write to disk. When set to certain paths they can overwrite
important files.
* Blend files can contain user preferences and those will be loaded
automatically.
* Keyboard shortcuts can be bound to arbitrary operators which can be
used to do pretty much anything.
* We don't generally keep up with the latest security fixes for jpg,
png, .. libraries.
* Auto Start for games.
* Specially crafted screen setup so user executes code in the python
console editor without noticing.
* Buffer overflows are easy to achieve with the current .blend file
reading code.

Scripts of course make it easier, but even without that it's still
fairly easy to do damage.

Brecht.
_______________________________________________
Bf-committers mailing list
Bf-committers@blender.org
http://lists.blender.org/mailman/listinfo/bf-committers

Reply via email to