7.1
CWE
119
Advisory Published
Updated

CVE-2013-0131: Buffer Overflow

First published: Mon Apr 08 2013(Updated: )

Buffer overflow in the NVIDIA GPU driver before 304.88, 310.x before 310.44, and 313.x before 313.30 for the X Window System on UNIX, when NoScanout mode is enabled, allows remote authenticated users to execute arbitrary code via a large ARGB cursor.

Credit: cret@cert.org

Affected SoftwareAffected VersionHow to fix
NVIDIA GPU kernel driver<=304.00
NVIDIA GPU kernel driver<=304.00
NVIDIA GPU kernel driver<=304.00
NVIDIA GPU kernel driver<=304.00
NVIDIA GPU kernel driver=195.22
NVIDIA GPU kernel driver=195.22
NVIDIA GPU kernel driver=195.22
NVIDIA GPU kernel driver=195.22
NVIDIA GPU kernel driver=310.00
NVIDIA GPU kernel driver=310.00
NVIDIA GPU kernel driver=310.00
NVIDIA GPU kernel driver=310.00
NVIDIA GPU kernel driver=313.00
NVIDIA GPU kernel driver=313.00
NVIDIA GPU kernel driver=313.00
NVIDIA GPU kernel driver=313.00

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2013-0131?

    The severity of CVE-2013-0131 is rated as high due to its potential to allow remote execution of arbitrary code.

  • How do I fix CVE-2013-0131?

    To fix CVE-2013-0131, you should update the NVIDIA GPU driver to a version that is 304.88 or higher, 310.44 or higher, or 313.30 or higher.

  • What systems are affected by CVE-2013-0131?

    CVE-2013-0131 affects NVIDIA GPU drivers on various UNIX systems, including FreeBSD, SunOS, and Linux Kernel across multiple versions.

  • Can CVE-2013-0131 be exploited remotely?

    Yes, CVE-2013-0131 can be exploited remotely by authenticated users when NoScanout mode is enabled.

  • What happens if I am still using an vulnerable version of the NVIDIA GPU driver related to CVE-2013-0131?

    If you are using a vulnerable version of the NVIDIA GPU driver, your system may be at risk of buffer overflow attacks that could lead to arbitrary code execution.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203