CVE-2023-33865
7.8HIGHRenderDoc before 1.27 allows local privilege escalation via a symlink attack. It relies on the /tmp/RenderDoc directory regardless of ownership.
Veröffentlicht: 6/7/2023Aktualisiert: 11/3/2025
Beschreibung
RenderDoc before 1.27 allows local privilege escalation via a symlink attack. It relies on the /tmp/RenderDoc directory regardless of ownership.
KI-AnalyseKI-gestützt
Betroffene Produkte
renderdocrenderdoc
Referenzen
- http://packetstormsecurity.com/files/172804/RenderDoc-1.26-Local-Privilege-Escalation-Remote-Code-Execution.htmlExploitThird Party AdvisoryVDB Entry
- http://seclists.org/fulldisclosure/2023/Jun/2ExploitMailing ListThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2023/07/msg00023.htmlThird Party Advisory
- https://renderdoc.org/Product
- https://security.gentoo.org/glsa/202311-10
- https://www.qualys.com/2023/06/06/renderdoc/renderdoc.txtExploitThird Party Advisory
- http://packetstormsecurity.com/files/172804/RenderDoc-1.26-Local-Privilege-Escalation-Remote-Code-Execution.htmlExploitThird Party AdvisoryVDB Entry
- http://seclists.org/fulldisclosure/2023/Jun/2ExploitMailing ListThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2023/07/msg00023.htmlThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2024/12/msg00008.html
- https://renderdoc.org/Product
- https://security.gentoo.org/glsa/202311-10
- https://www.qualys.com/2023/06/06/renderdoc/renderdoc.txtExploitThird Party Advisory