CVE-2015-5053
Vulnerability from cvelistv5
Published
2015-11-24 20:00
Modified
2024-08-06 06:32
Severity ?
EPSS score ?
Summary
The host memory mapping path feature in the NVIDIA GPU graphics driver R346 before 346.87 and R352 before 352.41 for Linux and R352 before 352.46 for GRID vGPU and vSGA does not properly restrict access to third-party device IO memory, which allows attackers to gain privileges, cause a denial of service (resource consumption), or possibly have unspecified other impact via unknown vectors related to the follow_pfn kernel-mode API call.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://nvidia.custhelp.com/app/answers/detail/a_id/3802 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://nvidia.custhelp.com/app/answers/detail/a_id/3802 | Vendor Advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T06:32:32.674Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/3802" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-11-05T00:00:00", "descriptions": [ { "lang": "en", "value": "The host memory mapping path feature in the NVIDIA GPU graphics driver R346 before 346.87 and R352 before 352.41 for Linux and R352 before 352.46 for GRID vGPU and vSGA does not properly restrict access to third-party device IO memory, which allows attackers to gain privileges, cause a denial of service (resource consumption), or possibly have unspecified other impact via unknown vectors related to the follow_pfn kernel-mode API call." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-11-24T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/3802" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-5053", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The host memory mapping path feature in the NVIDIA GPU graphics driver R346 before 346.87 and R352 before 352.41 for Linux and R352 before 352.46 for GRID vGPU and vSGA does not properly restrict access to third-party device IO memory, which allows attackers to gain privileges, cause a denial of service (resource consumption), or possibly have unspecified other impact via unknown vectors related to the follow_pfn kernel-mode API call." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://nvidia.custhelp.com/app/answers/detail/a_id/3802", "refsource": "CONFIRM", "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/3802" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-5053", "datePublished": "2015-11-24T20:00:00", "dateReserved": "2015-06-24T00:00:00", "dateUpdated": "2024-08-06T06:32:32.674Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2015-5053\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2015-11-24T20:59:02.327\",\"lastModified\":\"2024-11-21T02:32:13.823\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The host memory mapping path feature in the NVIDIA GPU graphics driver R346 before 346.87 and R352 before 352.41 for Linux and R352 before 352.46 for GRID vGPU and vSGA does not properly restrict access to third-party device IO memory, which allows attackers to gain privileges, cause a denial of service (resource consumption), or possibly have unspecified other impact via unknown vectors related to the follow_pfn kernel-mode API call.\"},{\"lang\":\"es\",\"value\":\"La funcionalidad de ruta de mapeo de memoria del anfitri\u00f3n en el controlador de gr\u00e1ficos NVDIA GPU R346 en versiones anteriores a 346.87 y R352 en versiones anteriores a 352.41 para Linux y R352 en versiones anteriores a 352.46 para GRID vGPU y vSGA no restringe adecuadamente el acceso a la memoria IO de dispositivo de terceros, lo que permite a atacantes obtener privilegios, provocar una denegaci\u00f3n de servicio (consumo de recursos) o posiblemente tener otro impacto no especificado a trav\u00e9s de vectores desconocidos relacionados con la llamada a la API follow_pfn kernel-mode.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-284\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nvidia:gpu_driver:346.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F66FF1CC-65E5-4BDD-89D4-5C93D727F7CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nvidia:gpu_driver:346.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25747F03-9EA3-4CE1-A123-D5CADA6933AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nvidia:gpu_driver:346.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58FC4D3B-E479-48CA-91CA-BAFA6CF3F280\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nvidia:gpu_driver:346.47:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9085684-E8C0-44EB-B54C-FDEA22FACE2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nvidia:gpu_driver:346.59:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D40C092-060C-46CB-9E78-425D66EA08C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nvidia:gpu_driver:346.72:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C375BF1A-3BE4-4E3F-A759-BAC8EB6823E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nvidia:gpu_driver:346.82:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECCE1985-7A6A-4B71-A240-A0F323790FAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nvidia:gpu_driver:352.09:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52609A32-06F4-44F1-B24F-089C1290E034\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nvidia:gpu_driver:352.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0A76CF8-1414-489B-84D3-98B3614B7361\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nvidia:gpu_driver:352.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"749B43E8-87CB-4519-AF28-F9D11FB2C607\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nvidia:gpu_driver:352.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F45C4CC-6DD9-4CD9-9992-D7DD24FFB61B\"}]}]}],\"references\":[{\"url\":\"http://nvidia.custhelp.com/app/answers/detail/a_id/3802\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://nvidia.custhelp.com/app/answers/detail/a_id/3802\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.