VAR-201304-0128
Vulnerability from variot - Updated: 2023-12-18 12:38The NVIDIA driver before 307.78, and Release 310 before 311.00, in the NVIDIA Display Driver service on Windows does not properly handle exceptions, which allows local users to gain privileges or cause a denial of service (memory overwrite) via a crafted application. NVIDIA video card drivers contain multiple vulnerabilities. NVIDIA Graphics Driver for Windows is prone to a local privilege-escalation vulnerability. A local attacker may exploit this issue to gain escalated privileges and execute arbitrary code with administrator privileges. Successful exploits will result in the complete compromise of affected computers. NVIDIA Graphics Driver for Windows versions prior to 307.83 and 311.00 are vulnerable
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201304-0128",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "display driver",
"scope": "eq",
"trust": 1.6,
"vendor": "nvidia",
"version": "310.00"
},
{
"model": "display driver",
"scope": "lte",
"trust": 1.0,
"vendor": "nvidia",
"version": "307.00"
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "nvidia",
"version": null
},
{
"model": "display driver",
"scope": "eq",
"trust": 0.8,
"vendor": "nvidia",
"version": "of nvidia driver 311.00"
},
{
"model": "display driver",
"scope": "lt",
"trust": 0.8,
"vendor": "nvidia",
"version": "310"
},
{
"model": "display driver",
"scope": "eq",
"trust": 0.6,
"vendor": "nvidia",
"version": "307.00"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#957036"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-002164"
},
{
"db": "NVD",
"id": "CVE-2013-0109"
},
{
"db": "CNNVD",
"id": "CNNVD-201303-280"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:nvidia:display_driver:310.00:-:*:*:*:windows:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:nvidia:display_driver:*:-:*:*:*:windows:*:*",
"cpe_name": [],
"versionEndIncluding": "307.00",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2013-0109"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Reported by the vendor.",
"sources": [
{
"db": "BID",
"id": "58459"
}
],
"trust": 0.3
},
"cve": "CVE-2013-0109",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Local",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 7.2,
"confidentialityImpact": "Complete",
"exploitabilityScore": null,
"id": "CVE-2013-0109",
"impactScore": null,
"integrityImpact": "Complete",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2013-0109",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201303-280",
"trust": 0.6,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2013-002164"
},
{
"db": "NVD",
"id": "CVE-2013-0109"
},
{
"db": "CNNVD",
"id": "CNNVD-201303-280"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The NVIDIA driver before 307.78, and Release 310 before 311.00, in the NVIDIA Display Driver service on Windows does not properly handle exceptions, which allows local users to gain privileges or cause a denial of service (memory overwrite) via a crafted application. NVIDIA video card drivers contain multiple vulnerabilities. NVIDIA Graphics Driver for Windows is prone to a local privilege-escalation vulnerability. \nA local attacker may exploit this issue to gain escalated privileges and execute arbitrary code with administrator privileges. Successful exploits will result in the complete compromise of affected computers. \nNVIDIA Graphics Driver for Windows versions prior to 307.83 and 311.00 are vulnerable",
"sources": [
{
"db": "NVD",
"id": "CVE-2013-0109"
},
{
"db": "CERT/CC",
"id": "VU#957036"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-002164"
},
{
"db": "BID",
"id": "58459"
}
],
"trust": 2.61
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "CERT/CC",
"id": "VU#957036",
"trust": 3.2
},
{
"db": "NVD",
"id": "CVE-2013-0109",
"trust": 2.7
},
{
"db": "JVN",
"id": "JVNVU93435452",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2013-002164",
"trust": 0.8
},
{
"db": "SECUNIA",
"id": "52546",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-201303-280",
"trust": 0.6
},
{
"db": "BID",
"id": "58459",
"trust": 0.3
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#957036"
},
{
"db": "BID",
"id": "58459"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-002164"
},
{
"db": "NVD",
"id": "CVE-2013-0109"
},
{
"db": "CNNVD",
"id": "CNNVD-201303-280"
}
]
},
"id": "VAR-201304-0128",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 0.33333334
},
"last_update_date": "2023-12-18T12:38:34.851000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "NVIDIA Product Security",
"trust": 0.8,
"url": "http://www.nvidia.com/object/product-security.html"
},
{
"title": "NVIDIA Driver Downloads",
"trust": 0.8,
"url": "http://www.nvidia.com/download/index.aspx"
},
{
"title": "NVIDIA Software Fix for Windows Display Driver Security Vulnerabilities",
"trust": 0.8,
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/3288"
},
{
"title": "NVIDIA\u793e\u30c7\u30a3\u30b9\u30d7\u30ec\u30a4\u30c9\u30e9\u30a4\u30d0\u30fc\u306e\u8106\u5f31\u6027\u306b\u95a2\u3059\u308b\u304a\u77e5\u3089\u305b",
"trust": 0.8,
"url": "http://www.fmworld.net/biz/common/nvidia/"
},
{
"title": "NVGuardService",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=45700"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2013-002164"
},
{
"db": "CNNVD",
"id": "CNNVD-201303-280"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2013-002164"
},
{
"db": "NVD",
"id": "CVE-2013-0109"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.4,
"url": "http://www.kb.cert.org/vuls/id/957036"
},
{
"trust": 1.6,
"url": "http://www.nvidia.com/object/product-security.html"
},
{
"trust": 0.8,
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/3288"
},
{
"trust": 0.8,
"url": "http://www.nvidia.com/download/index.aspx?lang=en-us"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-0109"
},
{
"trust": 0.8,
"url": "http://jvn.jp/cert/jvnvu93435452/index.html"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-0109"
},
{
"trust": 0.6,
"url": "http://secunia.com/advisories/52546"
},
{
"trust": 0.3,
"url": "http://www.nvidia.com"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#957036"
},
{
"db": "BID",
"id": "58459"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-002164"
},
{
"db": "NVD",
"id": "CVE-2013-0109"
},
{
"db": "CNNVD",
"id": "CNNVD-201303-280"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CERT/CC",
"id": "VU#957036"
},
{
"db": "BID",
"id": "58459"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-002164"
},
{
"db": "NVD",
"id": "CVE-2013-0109"
},
{
"db": "CNNVD",
"id": "CNNVD-201303-280"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2013-03-21T00:00:00",
"db": "CERT/CC",
"id": "VU#957036"
},
{
"date": "2013-02-15T00:00:00",
"db": "BID",
"id": "58459"
},
{
"date": "2013-04-10T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2013-002164"
},
{
"date": "2013-04-08T16:55:01.977000",
"db": "NVD",
"id": "CVE-2013-0109"
},
{
"date": "2013-03-15T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201303-280"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-07-30T00:00:00",
"db": "CERT/CC",
"id": "VU#957036"
},
{
"date": "2013-12-17T12:59:00",
"db": "BID",
"id": "58459"
},
{
"date": "2013-04-10T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2013-002164"
},
{
"date": "2013-04-09T04:00:00",
"db": "NVD",
"id": "CVE-2013-0109"
},
{
"date": "2013-03-15T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201303-280"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "BID",
"id": "58459"
},
{
"db": "CNNVD",
"id": "CNNVD-201303-280"
}
],
"trust": 0.9
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "NVIDIA Windows video card drivers contain multiple vulnerabilities",
"sources": [
{
"db": "CERT/CC",
"id": "VU#957036"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "buffer overflow",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201303-280"
}
],
"trust": 0.6
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…