CVE-2023-33863

SerialiseValue in RenderDoc before 1.27 allows an Integer Overflow with a resultant Buffer Overflow. 0xffffffff is sign-extended to 0xffffffffffffffff (SIZE_MAX) and then there is an attempt to add 1.
Configurations

Configuration 1 (hide)

cpe:2.3:a:renderdoc:renderdoc:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:06

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/172804/RenderDoc-1.26-Local-Privilege-Escalation-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/172804/RenderDoc-1.26-Local-Privilege-Escalation-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry
References () http://seclists.org/fulldisclosure/2023/Jun/2 - Exploit, Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2023/Jun/2 - Exploit, Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2023/07/msg00023.html - Third Party Advisory () https://lists.debian.org/debian-lts-announce/2023/07/msg00023.html - Third Party Advisory
References () https://renderdoc.org/ - Product () https://renderdoc.org/ - Product
References () https://security.gentoo.org/glsa/202311-10 - () https://security.gentoo.org/glsa/202311-10 -
References () https://www.qualys.com/2023/06/06/renderdoc/renderdoc.txt - Exploit, Third Party Advisory () https://www.qualys.com/2023/06/06/renderdoc/renderdoc.txt - Exploit, Third Party Advisory

25 Nov 2023, 11:15

Type Values Removed Values Added
References
  • () https://security.gentoo.org/glsa/202311-10 -

Information

Published : 2023-06-07 20:15

Updated : 2025-01-08 15:15


NVD link : CVE-2023-33863

Mitre link : CVE-2023-33863

CVE.ORG link : CVE-2023-33863


JSON object : View

Products Affected

renderdoc

  • renderdoc
CWE
CWE-190

Integer Overflow or Wraparound