First published: Sat Apr 01 2023(Updated: )
NVIDIA DCGM for Linux contains a vulnerability in HostEngine (server component) where a user may cause a heap-based buffer overflow through the bound socket. A successful exploit of this vulnerability may lead to denial of service and data tampering.
Credit: psirt@nvidia.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nvidia Data Center Gpu Manager | <3.1.7 | |
Linux Linux kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-0208.
The title of the vulnerability is NVIDIA DCGM for Linux contains a vulnerability in HostEngine (server component) where a user may cause a heap-based buffer overflow through the bound socket.
The severity of CVE-2023-0208 is high with a severity value of 7.1.
Nvidia Data Center Gpu Manager versions up to 3.1.7 are affected by CVE-2023-0208.
A user can exploit the vulnerability by causing a heap-based buffer overflow through the bound socket in the HostEngine (server component) of NVIDIA DCGM for Linux.
The potential consequences of this vulnerability include denial of service and data tampering.
Update Nvidia Data Center Gpu Manager to version 3.1.8 or later to fix the vulnerability.
You can find more information about CVE-2023-0208 at the following link: https://nvidia.custhelp.com/app/answers/detail/a_id/5453
The associated CWE IDs for this vulnerability are 119, 787, and 122.