Overview
A vulnerability in the NVIDIA Display Driver for Unix systems may allow a remote attacker to execute code on a vulnerable system.
Description
The NVIDIA Display Driver for Unix systems provides access to the display adapter's accelerated features on supported systems, and includes a module for use with the X windowing system. Some versions of the driver contain a buffer overflow vulnerability in handling the size specification of text character data known as glyphs. An attacker with the ability to supply a specially crafted sequence of glyphs could exploit this vulnerability. Such an exploit could be supplied remotely via a malicious remote X client or an existing X client program, such as a web browser or email client. |
Impact
A remote unauthenticated attacker may be able to execute arbitrary code on a vulnerable system or cause that system's X server to crash. The attacker-supplied code would be executed with the privileges of the X server, typically root. |
Solution
We are unaware of a practical solution to this problem. |
Workarounds |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
This issue was discovered by Derek Abdine of Rapid7, LLC and reported in Rapid7 Advisory R7-0025. Rapid7 also credits Marc Bevand with assistance.
This document was written by Chad R Dougherty.
Other Information
CVE IDs: | CVE-2006-5379 |
Severity Metric: | 12.29 |
Date Public: | 2006-10-16 |
Date First Published: | 2006-10-17 |
Date Last Updated: | 2006-11-17 17:47 UTC |
Document Revision: | 20 |