Lucene search

K
vulnrichmentRedhatVULNRICHMENT:CVE-2023-5633
HistoryOct 23, 2023 - 9:58 p.m.

CVE-2023-5633 Kernel: vmwgfx: reference count issue leads to use-after-free in surface handling

2023-10-2321:58:59
CWE-416
redhat
github.com
9
cve-2023-5633 kernel use-after-free vmware escalation privilege.

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

6.7

Confidence

High

EPSS

0

Percentile

15.9%

SSVC

Exploitation

None

Automatable

No

Technical Impact

Total

The reference count changes made as part of the CVE-2023-33951 and CVE-2023-33952 fixes exposed a use-after-free flaw in the way memory objects were handled when they were being used to store a surface. When running inside a VMware guest with 3D acceleration enabled, a local, unprivileged user could potentially use this flaw to escalate their privileges.

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

6.7

Confidence

High

EPSS

0

Percentile

15.9%

SSVC

Exploitation

None

Automatable

No

Technical Impact

Total