Vulnerability Details : CVE-2023-33863
Potential exploit
SerialiseValue in RenderDoc before 1.27 allows an Integer Overflow with a resultant Buffer Overflow. 0xffffffff is sign-extended to 0xffffffffffffffff (SIZE_MAX) and then there is an attempt to add 1.
Vulnerability category: Overflow
Products affected by CVE-2023-33863
- cpe:2.3:a:renderdoc:renderdoc:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-33863
0.73%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 81 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-33863
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 2025-01-08 |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2023-33863
-
The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number.Assigned by:
- 134c704f-9b21-4f2e-91b3-4a467353bcc0 (Secondary)
- nvd@nist.gov (Primary)
References for CVE-2023-33863
-
https://www.qualys.com/2023/06/06/renderdoc/renderdoc.txt
Exploit;Third Party Advisory
-
http://seclists.org/fulldisclosure/2023/Jun/2
Full Disclosure: LPE and RCE in RenderDoc: CVE-2023-33865, CVE-2023-33864, CVE-2023-33863Exploit;Mailing List;Third Party Advisory
-
https://security.gentoo.org/glsa/202311-10
RenderDoc: Multiple Vulnerabilities (GLSA 202311-10) — Gentoo security
-
https://renderdoc.org/
RenderDocProduct
-
https://lists.debian.org/debian-lts-announce/2023/07/msg00023.html
[SECURITY] [DLA 3501-1] renderdoc security updateThird Party Advisory
-
http://packetstormsecurity.com/files/172804/RenderDoc-1.26-Local-Privilege-Escalation-Remote-Code-Execution.html
RenderDoc 1.26 Local Privilege Escalation / Remote Code Execution ≈ Packet StormExploit;Third Party Advisory;VDB Entry
Jump to