First published: Wed Jul 21 2021(Updated: )
NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin) that could allow an attacker to cause stack-based buffer overflow and put a customized ROP gadget on the stack. Such an attack may lead to information disclosure, data tampering, or denial of service. This affects vGPU version 12.x (prior to 12.3), version 11.x (prior to 11.5) and version 8.x (prior 8.8).
Credit: psirt@nvidia.com
Affected Software | Affected Version | How to fix |
---|---|---|
NVIDIA vGPU Software | >=8.0<8.8 | |
NVIDIA vGPU Software | >=11.0<11.5 | |
NVIDIA vGPU Software | >=12.0<12.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-1099 is high due to its potential for stack-based buffer overflow and exploitation risk.
To fix CVE-2021-1099, update the NVIDIA vGPU software to the latest version as recommended by NVIDIA.
CVE-2021-1099 affects NVIDIA vGPU versions between 8.0 to 8.8, 11.0 to 11.5, and 12.0 to 12.3.
CVE-2021-1099 can enable attacks that lead to information disclosure, data tampering, or denial of service.
Currently, there are no known workarounds for CVE-2021-1099; updating the software is the recommended mitigation.