
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-0606 is a vulnerability in RenderDoc, a graphics debugger that supports Vulkan, D3D11, OpenGL, OpenGL ES, and D3D12 across multiple platforms. The vulnerability was discovered in RenderDoc <= v1.26 and was fixed in v1.27 on May 19, 2023 (Qualys Report).
The vulnerability exists in RenderDoc's server thread implementation that listens on TCP port 38920. When a client connects, the server must read a handshake packet containing a client name string. The server allocates an intermediary buffer of 64KB and reads the packet, but mistakenly believes that the total number of bytes read (m_InputSize) can never exceed the buffer size (m_BufferSize). This leads to an integer underflow in the calculation of bufSize, resulting in a much larger size being passed to recv() than the destination buffer can hold (Qualys Report).
The vulnerability allows a remote attacker to execute arbitrary code on the machine running RenderDoc through a heap-based buffer overflow. The attack can be executed reliably and in one shot, bypassing modern security protections including ASLR, PIE, NX, and stack canaries (Qualys Report).
The vulnerability was fixed in RenderDoc v1.27. Users should upgrade to this version or later to mitigate the risk. The fix was implemented through multiple commits that address the buffer overflow issues (Qualys Report).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."