FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

NVIDIA UNIX driver -- ARGB cursor buffer overflow in "NoScanout" mode

Affected packages
310.14 <= nvidia-driver < 310.44
195.22 <= nvidia-driver < 304.88

Details

VuXML ID 1431f2d6-a06e-11e2-b9e0-001636d274f3
Discovery 2013-03-27
Entry 2013-04-08

NVIDIA Unix security team reports:

When the NVIDIA driver for the X Window System is operated in "NoScanout" mode, and an X client installs an ARGB cursor that is larger than the expected size (64x64 or 256x256, depending on the driver version), the driver will overflow a buffer. This can cause a denial of service (e.g., an X server segmentation fault), or could be exploited to achieve arbitrary code execution. Because the X server runs as setuid root in many configurations, an attacker could potentially use this vulnerability in those configurations to gain root privileges.

References

CVE Name CVE-2013-0131
URL http://nvidia.custhelp.com/app/answers/detail/a_id/3290