Vulnerability Details : CVE-2023-33864
Potential exploit
StreamReader::ReadFromExternal in RenderDoc before 1.27 allows an Integer Overflow with a resultant Buffer Overflow. It uses uint32_t(m_BufferSize-m_InputSize) even though m_InputSize can exceed m_BufferSize.
Vulnerability category: Overflow
Products affected by CVE-2023-33864
- cpe:2.3:a:renderdoc:renderdoc:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-33864
0.73%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 81 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-33864
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 2025-01-08 |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2023-33864
-
The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number.Assigned by:
- 134c704f-9b21-4f2e-91b3-4a467353bcc0 (Secondary)
- nvd@nist.gov (Primary)
References for CVE-2023-33864
-
https://www.qualys.com/2023/06/06/renderdoc/renderdoc.txt
Exploit;Third Party Advisory
-
http://seclists.org/fulldisclosure/2023/Jun/2
Full Disclosure: LPE and RCE in RenderDoc: CVE-2023-33865, CVE-2023-33864, CVE-2023-33863Exploit;Mailing List;Third Party Advisory
-
https://security.gentoo.org/glsa/202311-10
RenderDoc: Multiple Vulnerabilities (GLSA 202311-10) — Gentoo security
-
https://renderdoc.org/
RenderDocProduct
-
https://lists.debian.org/debian-lts-announce/2023/07/msg00023.html
[SECURITY] [DLA 3501-1] renderdoc security updateThird Party Advisory
-
http://packetstormsecurity.com/files/172804/RenderDoc-1.26-Local-Privilege-Escalation-Remote-Code-Execution.html
RenderDoc 1.26 Local Privilege Escalation / Remote Code Execution ≈ Packet StormExploit;Third Party Advisory;VDB Entry
Jump to