RenderDoc before 1.27 allows local privilege escalation via a symlink attack. It relies on the /tmp/RenderDoc directory regardless of ownership.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/172804/RenderDoc-1.26-Local-Privilege-Escalation-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2023/Jun/2 | Exploit Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2023/07/msg00023.html | Third Party Advisory |
https://renderdoc.org/ | Product |
https://security.gentoo.org/glsa/202311-10 | |
https://www.qualys.com/2023/06/06/renderdoc/renderdoc.txt | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2023-06-07 20:15
Updated : 2023-11-25 11:15
NVD link : CVE-2023-33865
Mitre link : CVE-2023-33865
CVE.ORG link : CVE-2023-33865
JSON object : View
Products Affected
renderdoc
- renderdoc
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')