First published: Mon Apr 08 2013(Updated: )
Buffer overflow in the NVIDIA GPU driver before 304.88, 310.x before 310.44, and 313.x before 313.30 for the X Window System on UNIX, when NoScanout mode is enabled, allows remote authenticated users to execute arbitrary code via a large ARGB cursor.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
NVIDIA GPU kernel driver | <=304.00 | |
NVIDIA GPU kernel driver | <=304.00 | |
NVIDIA GPU kernel driver | <=304.00 | |
NVIDIA GPU kernel driver | <=304.00 | |
NVIDIA GPU kernel driver | =195.22 | |
NVIDIA GPU kernel driver | =195.22 | |
NVIDIA GPU kernel driver | =195.22 | |
NVIDIA GPU kernel driver | =195.22 | |
NVIDIA GPU kernel driver | =310.00 | |
NVIDIA GPU kernel driver | =310.00 | |
NVIDIA GPU kernel driver | =310.00 | |
NVIDIA GPU kernel driver | =310.00 | |
NVIDIA GPU kernel driver | =313.00 | |
NVIDIA GPU kernel driver | =313.00 | |
NVIDIA GPU kernel driver | =313.00 | |
NVIDIA GPU kernel driver | =313.00 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2013-0131 is rated as high due to its potential to allow remote execution of arbitrary code.
To fix CVE-2013-0131, you should update the NVIDIA GPU driver to a version that is 304.88 or higher, 310.44 or higher, or 313.30 or higher.
CVE-2013-0131 affects NVIDIA GPU drivers on various UNIX systems, including FreeBSD, SunOS, and Linux Kernel across multiple versions.
Yes, CVE-2013-0131 can be exploited remotely by authenticated users when NoScanout mode is enabled.
If you are using a vulnerable version of the NVIDIA GPU driver, your system may be at risk of buffer overflow attacks that could lead to arbitrary code execution.