描述
RenderDoc before 1.27 allows local privilege escalation via a symlink attack. It relies on the /tmp/RenderDoc directory regardless of ownership.
AI分析AI驱动
受影响产品
renderdocrenderdoc
参考资料
- http://packetstormsecurity.com/files/172804/RenderDoc-1.26-Local-Privilege-Escalation-Remote-Code-Execution.htmlExploitThird Party AdvisoryVDB Entry
- http://seclists.org/fulldisclosure/2023/Jun/2ExploitMailing ListThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2023/07/msg00023.htmlThird Party Advisory
- https://renderdoc.org/Product
- https://security.gentoo.org/glsa/202311-10
- https://www.qualys.com/2023/06/06/renderdoc/renderdoc.txtExploitThird Party Advisory
- http://packetstormsecurity.com/files/172804/RenderDoc-1.26-Local-Privilege-Escalation-Remote-Code-Execution.htmlExploitThird Party AdvisoryVDB Entry
- http://seclists.org/fulldisclosure/2023/Jun/2ExploitMailing ListThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2023/07/msg00023.htmlThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2024/12/msg00008.html
- https://renderdoc.org/Product
- https://security.gentoo.org/glsa/202311-10
- https://www.qualys.com/2023/06/06/renderdoc/renderdoc.txtExploitThird Party Advisory