CVE-2023-33865
Severity CVSS v4.0:
Pending analysis
Type:
CWE-59
Link Following
Publication date:
07/06/2023
Last modified:
03/11/2025
Description
RenderDoc before 1.27 allows local privilege escalation via a symlink attack. It relies on the /tmp/RenderDoc directory regardless of ownership.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:renderdoc:renderdoc:*:*:*:*:*:*:*:* | 1.27 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://packetstormsecurity.com/files/172804/RenderDoc-1.26-Local-Privilege-Escalation-Remote-Code-Execution.html
- http://seclists.org/fulldisclosure/2023/Jun/2
- https://lists.debian.org/debian-lts-announce/2023/07/msg00023.html
- https://renderdoc.org/
- https://security.gentoo.org/glsa/202311-10
- https://www.qualys.com/2023/06/06/renderdoc/renderdoc.txt
- http://packetstormsecurity.com/files/172804/RenderDoc-1.26-Local-Privilege-Escalation-Remote-Code-Execution.html
- http://seclists.org/fulldisclosure/2023/Jun/2
- https://lists.debian.org/debian-lts-announce/2023/07/msg00023.html
- https://lists.debian.org/debian-lts-announce/2024/12/msg00008.html
- https://renderdoc.org/
- https://security.gentoo.org/glsa/202311-10
- https://www.qualys.com/2023/06/06/renderdoc/renderdoc.txt



