A vulnerability in the NVIDIA Display Driver for Unix systems may allow a remote attacker to execute code on a vulnerable system.
The NVIDIA Display Driver for Unix systems provides access to the display adapter's accelerated features on supported systems, and includes a module for use with the X windowing system. Some versions of the driver contain a buffer overflow vulnerability in handling the size specification of text character data known as glyphs.
An attacker with the ability to supply a specially crafted sequence of glyphs could exploit this vulnerability. Such an exploit could be supplied remotely via a malicious remote X client or an existing X client program, such as a web browser or email client.
A remote unauthenticated attacker may be able to execute arbitrary code on a vulnerable system or cause that system's X server to crash. The attacker-supplied code would be executed with the privileges of the X server, typically root.
We are unaware of a practical solution to this problem.
This issue was discovered by Derek Abdine of Rapid7, LLC and reported in Rapid7 Advisory R7-0025. Rapid7 also credits Marc Bevand with assistance.
This document was written by Chad R Dougherty.
|Date First Published:||2006-10-17|
|Date Last Updated:||2006-11-17 17:47 UTC|