search menu icon-carat-right cmu-wordmark

CERT Coordination Center

NVIDIA Display Driver for Unix systems vulnerable to buffer overflow

Vulnerability Note VU#147252

Original Release Date: 2006-10-17 | Last Revised: 2006-11-17

Overview

A vulnerability in the NVIDIA Display Driver for Unix systems may allow a remote attacker to execute code on a vulnerable system.

Description

The NVIDIA Display Driver for Unix systems provides access to the display adapter's accelerated features on supported systems, and includes a module for use with the X windowing system. Some versions of the driver contain a buffer overflow vulnerability in handling the size specification of text character data known as glyphs.

An attacker with the ability to supply a specially crafted sequence of glyphs could exploit this vulnerability. Such an exploit could be supplied remotely via a malicious remote X client or an existing X client program, such as a web browser or email client.

We are aware of publicly available exploit code for this vulnerability.

Impact

A remote unauthenticated attacker may be able to execute arbitrary code on a vulnerable system or cause that system's X server to crash. The attacker-supplied code would be executed with the privileges of the X server, typically root.

Solution

We are unaware of a practical solution to this problem.

Workarounds

Use the nv driver
Disable the NVIDIA-supplied driver in favor of the "nv" driver that is included by default with many X distributions. Note that implementing this workaround will result in loss of performance and features since the nv driver does not provide access to the accelerated 3D features of the video adapter.

Upgrade to the latest beta version of the driver
The latest beta version of the driver for Unix systems (Version: 1.0-9625) does not appear to contain this vulnerability. More information can be found on the NVIDIA BETA Drivers download page. Users may wish to upgrade to this version until an official release can be obtained from the vendor.

Vendor Information

147252
 

NVIDIA Affected

Updated:  October 17, 2006

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Sun Microsystems, Inc. Affected

Updated:  November 17, 2006

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Sun Microsystems has published Sun Alert ID: 102693 in response to this issue. Users are encouraged to review this alert and apply the patches it refers to.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Ubuntu Affected

Updated:  November 17, 2006

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The Ubuntu development team has published Ubuntu Security Notice USN-377-1 in response to this issue. Users are encouraged to review this notice and apply the patches it refers to.

If you have feedback, comments, or additional information about this vulnerability, please send us email.


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This issue was discovered by Derek Abdine of Rapid7, LLC and reported in Rapid7 Advisory R7-0025. Rapid7 also credits Marc Bevand with assistance.

This document was written by Chad R Dougherty.

Other Information

CVE IDs: CVE-2006-5379
Severity Metric: 12.29
Date Public: 2006-10-16
Date First Published: 2006-10-17
Date Last Updated: 2006-11-17 17:47 UTC
Document Revision: 20

Sponsored by CISA.