CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
EPSS
Percentile
97.3%
A vulnerability in the NVIDIA Display Driver for Unix systems may allow a remote attacker to execute code on a vulnerable system.
The NVIDIA Display Driver for Unix systems provides access to the display adapter’s accelerated features on supported systems, and includes a module for use with the X windowing system. Some versions of the driver contain a buffer overflow vulnerability in handling the size specification of text character data known as glyphs.
An attacker with the ability to supply a specially crafted sequence of glyphs could exploit this vulnerability. Such an exploit could be supplied remotely via a malicious remote X client or an existing X client program, such as a web browser or email client.
We are aware of publicly available exploit code for this vulnerability.
A remote unauthenticated attacker may be able to execute arbitrary code on a vulnerable system or cause that system’s X server to crash. The attacker-supplied code would be executed with the privileges of the X server, typically root
.
We are unaware of a practical solution to this problem.
Workarounds
Use the**nv**
** driver**
Disable the NVIDIA-supplied driver in favor of the “nv
” driver that is included by default with many X distributions. Note that implementing this workaround will result in loss of performance and features since the nv
driver does not provide access to the accelerated 3D features of the video adapter.
Upgrade to the latest beta version of the driver
The latest beta version of the driver for Unix systems (Version: 1.0-9625) does not appear to contain this vulnerability. More information can be found on the NVIDIA BETA Drivers download page. Users may wish to upgrade to this version until an official release can be obtained from the vendor.
147252
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Updated: October 17, 2006
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Updated: November 17, 2006
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Sun Microsystems has published Sun Alert ID: 102693 in response to this issue. Users are encouraged to review this alert and apply the patches it refers to.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23147252 Feedback>).
Updated: November 17, 2006
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
The Ubuntu development team has published Ubuntu Security Notice USN-377-1 in response to this issue. Users are encouraged to review this notice and apply the patches it refers to.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23147252 Feedback>).
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
This issue was discovered by Derek Abdine of Rapid7, LLC and reported in Rapid7 Advisory R7-0025. Rapid7 also credits Marc Bevand with assistance.
This document was written by Chad R Dougherty.
CVE IDs: | CVE-2006-5379 |
---|---|
Severity Metric: | 12.29 Date Public: |