SerialiseValue in RenderDoc before 1.27 allows an Integer Overflow with a resultant Buffer Overflow. 0xffffffff is sign-extended to 0xffffffffffffffff (SIZE_MAX) and then there is an attempt to add 1.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/172804/RenderDoc-1.26-Local-Privilege-Escalation-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2023/Jun/2 | Exploit Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2023/07/msg00023.html | Third Party Advisory |
https://renderdoc.org/ | Product |
https://security.gentoo.org/glsa/202311-10 | |
https://www.qualys.com/2023/06/06/renderdoc/renderdoc.txt | Exploit Third Party Advisory |
http://packetstormsecurity.com/files/172804/RenderDoc-1.26-Local-Privilege-Escalation-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2023/Jun/2 | Exploit Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2023/07/msg00023.html | Third Party Advisory |
https://renderdoc.org/ | Product |
https://security.gentoo.org/glsa/202311-10 | |
https://www.qualys.com/2023/06/06/renderdoc/renderdoc.txt | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 08:06
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/172804/RenderDoc-1.26-Local-Privilege-Escalation-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://seclists.org/fulldisclosure/2023/Jun/2 - Exploit, Mailing List, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2023/07/msg00023.html - Third Party Advisory | |
References | () https://renderdoc.org/ - Product | |
References | () https://security.gentoo.org/glsa/202311-10 - | |
References | () https://www.qualys.com/2023/06/06/renderdoc/renderdoc.txt - Exploit, Third Party Advisory |
25 Nov 2023, 11:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
02 Aug 2023, 16:44
Type | Values Removed | Values Added |
---|---|---|
References | (MLIST) https://lists.debian.org/debian-lts-announce/2023/07/msg00023.html - Third Party Advisory |
25 Jul 2023, 07:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
22 Jul 2023, 21:15
Type | Values Removed | Values Added |
---|---|---|
Summary | SerialiseValue in RenderDoc before 1.27 allows an Integer Overflow with a resultant Buffer Overflow. 0xffffffff is sign-extended to 0xffffffffffffffff (SIZE_MAX) and then there is an attempt to add 1. |
14 Jun 2023, 19:44
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-190 | |
References | (MISC) http://packetstormsecurity.com/files/172804/RenderDoc-1.26-Local-Privilege-Escalation-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry | |
References | (FULLDISC) http://seclists.org/fulldisclosure/2023/Jun/2 - Exploit, Mailing List, Third Party Advisory | |
References | (MISC) https://www.qualys.com/2023/06/06/renderdoc/renderdoc.txt - Exploit, Third Party Advisory | |
References | (MISC) https://renderdoc.org/ - Product | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
First Time |
Renderdoc
Renderdoc renderdoc |
|
CPE | cpe:2.3:a:renderdoc:renderdoc:*:*:*:*:*:*:*:* |
08 Jun 2023, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
08 Jun 2023, 00:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
07 Jun 2023, 20:24
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-06-07 20:15
Updated : 2024-11-21 08:06
NVD link : CVE-2023-33863
Mitre link : CVE-2023-33863
CVE.ORG link : CVE-2023-33863
JSON object : View
Products Affected
renderdoc
- renderdoc
CWE
CWE-190
Integer Overflow or Wraparound