ID

VAR-201401-0137


CVE

CVE-2013-5987


TITLE

NVIDIA In graphics drivers GPU Vulnerability that can bypass access restrictions

Trust: 0.8

sources: JVNDB: JVNDB-2013-005889

DESCRIPTION

Unspecified vulnerability in NVIDIA graphics driver Release 331, 325, 319, 310, and 304 allows local users to bypass intended access restrictions for the GPU and gain privileges via unknown vectors. NVIDIA Graphics Drivers are prone to a local privilege-escalation vulnerability. A local attacker may exploit this issue to gain escalated privileges and execute arbitrary code with escalated privileges. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04036775 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04036775 Version: 1 HPSBHF02946 rev.1 - HP Servers with NVIDIA GPU Computing Driver, Elevation of Privilege NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2014-05-09 Last Updated: 2014-05-09 Potential Security Impact: Elevation of privilege Source: Hewlett-Packard Company, HP Software Security Response Team VULNERABILITY SUMMARY A potential security vulnerability has been identified with certain HP servers that use NVIDIA Computing GPU processors. The vulnerability could be exploited resulting in an elevation of privilege. References: CVE-2013-5987, SSRT101355 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. Server GPU type(s) DL360 G7 Q4000 SL390s G7 M2050, M2070, M2070Q, M2075, M2090 DL160 Gen8 Q4000 ML350p Gen8 Q4000, Q6000 DL360e Gen8 Q4000 DL380e Gen8 Q4000, Q6000 SL250s Gen8 M2070Q, M2075, M2090, K10, K20, K20X SL270s Gen8 M2070Q, M2075, M2090, K10, K20, K20X BACKGROUND CVSS 2.0 Base Metrics =========================================================== Reference Base Vector Base Score CVE-2013-5987 (AV:L/AC:M/Au:S/C:C/I:C/A:C) 6.6 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002 The Hewlett-Packard Company thanks NVIDIA and Marcin Kocielnicki from the X.Org Foundation Nouveau project for reporting this issue to security-alert@hp.com. RESOLUTION HP has provided an updated NVIDIA firmware driver version that resolves the security vulnerability. Download the firmware driver from hp.com Go to support and drivers. Search for the server model and then choose the operating system. Select "Driver - NVIDIA Computing." Note: For Windows choose the Driver NVIDIA Computing v3.21.01 or a subsequent version For Linux choose the Driver NVIDIA Computing v3.19.72 or a subsequent version HISTORY Version:1 (rev.1) - 9 May 2014 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com. Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/ Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX Copyright 2014 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.13 (GNU/Linux) iEYEARECAAYFAlNtE/EACgkQ4B86/C0qfVmMDwCgoDqC5FS8nW8RTOHZAUUqCZIY 0uIAn0TrMahIzRFsCo6DfAc8/FsNsz6f =mv1t -----END PGP SIGNATURE----- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 APPLE-SA-2014-02-25-1 OS X Mavericks 10.9.2 and Security Update 2014-001 OS X Mavericks 10.9.2 and Security Update 2014-001 is now available and addresses the following: Apache Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: Multiple vulnerabilities in Apache Description: Multiple vulnerabilities existed in Apache, the most serious of which may lead to cross-site scripting. These issues were addressed by updating Apache to version 2.2.26. CVE-ID CVE-2013-1862 CVE-2013-1896 App Sandbox Available for: OS X Mountain Lion v10.8.5 Impact: The App Sandbox may be bypassed Description: The LaunchServices interface for launching an application allowed sandboxed apps to specify the list of arguments passed to the new process. A compromised sandboxed application could abuse this to bypass the sandbox. This issue was addressed by preventing sandboxed applications from specifying arguments. This issue does not affect systems running OS X Mavericks 10.9 or later. CVE-ID CVE-2013-5179 : Friedrich Graeter of The Soulmen GbR ATS Available for: OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: Viewing or downloading a document containing a maliciously crafted embedded font may lead to arbitrary code execution Description: A memory corruption issue existed in the handling of handling of Type 1 fonts. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-1254 : Felix Groebert of the Google Security Team ATS Available for: OS X Mavericks 10.9 and 10.9.1 Impact: The App Sandbox may be bypassed Description: A memory corruption issue existed in the handling of Mach messages passed to ATS. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-1262 : Meder Kydyraliev of the Google Security Team ATS Available for: OS X Mavericks 10.9 and 10.9.1 Impact: The App Sandbox may be bypassed Description: An arbitrary free issue existed in the handling of Mach messages passed to ATS. This issue was addressed through additional validation of Mach messages. CVE-ID CVE-2014-1255 : Meder Kydyraliev of the Google Security Team ATS Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: The App Sandbox may be bypassed Description: A buffer overflow issue existed in the handling of Mach messages passed to ATS. This issue was addressed by additional bounds checking. CVE-ID CVE-2014-1256 : Meder Kydyraliev of the Google Security Team Certificate Trust Policy Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: Root certificates have been updated Description: The set of system root certificates has been updated. The complete list of recognized system roots may be viewed via the Keychain Access application. CFNetwork Cookies Available for: OS X Mountain Lion v10.8.5 Impact: Session cookies may persist even after resetting Safari Description: Resetting Safari did not always delete session cookies until Safari was closed. This issue was addressed through improved handling of session cookies. This issue does not affect systems running OS X Mavericks 10.9 or later. CVE-ID CVE-2014-1257 : Rob Ansaldo of Amherst College, Graham Bennett CoreAnimation Available for: OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: Visiting a maliciously crafted site may lead to an unexpected application termination or arbitrary code execution Description: A heap buffer overflow existed in CoreAnimation's handling of images. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-1258 : Karl Smith of NCC Group CoreText Available for: OS X Mavericks 10.9 and 10.9.1 Impact: Applications that use CoreText may be vulnerable to an unexpected application termination or arbitrary code execution Description: A signedness issue existed in CoreText in the handling of Unicode fonts. This issue is addressed through improved bounds checking. CVE-ID CVE-2014-1261 : Lucas Apa and Carlos Mario Penagos of IOActive Labs curl Available for: OS X Mavericks 10.9 and 10.9.1 Impact: An attacker with a privileged network position may intercept user credentials or other sensitive information Description: When using curl to connect to an HTTPS URL containing an IP address, the IP address was not validated against the certificate. This issue does not affect systems prior to OS X Mavericks v10.9. CVE-ID CVE-2014-1263 : Roland Moriz of Moriz GmbH Data Security Available for: OS X Mavericks 10.9 and 10.9.1 Impact: An attacker with a privileged network position may capture or modify data in sessions protected by SSL/TLS Description: Secure Transport failed to validate the authenticity of the connection. This issue was addressed by restoring missing validation steps. CVE-ID CVE-2014-1266 Date and Time Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: An unprivileged user may change the system clock Description: This update changes the behavior of the systemsetup command to require administrator privileges to change the system clock. CVE-ID CVE-2014-1265 File Bookmark Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: Viewing a file with a maliciously crafted name may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the handling of file names. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-1259 Finder Available for: OS X Mavericks 10.9 and 10.9.1 Impact: Accessing a file's ACL via Finder may lead to other users gaining unauthorized access to files Description: Accessing a file's ACL via Finder may corrupt the ACLs on the file. This issue was addressed through improved handling of ACLs. CVE-ID CVE-2014-1264 ImageIO Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: Viewing a maliciously crafted JPEG file may lead to the disclosure of memory contents Description: An uninitialized memory access issue existed in libjpeg's handling of JPEG markers, resulting in the disclosure of memory contents. This issue was addressed by better JPEG handling. CVE-ID CVE-2013-6629 : Michal Zalewski IOSerialFamily Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5 Impact: Executing a malicious application may result in arbitrary code execution within the kernel Description: An out of bounds array access existed in the IOSerialFamily driver. This issue was addressed through additional bounds checking. This issue does not affect systems running OS X Mavericks v10.9 or later. CVE-ID CVE-2013-5139 : @dent1zt LaunchServices Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5 Impact: A file could show the wrong extension Description: An issue existed in the handling of certain unicode characters that could allow filenames to show incorrect extensions. The issue was addressed by filtering unsafe unicode characters from display in filenames. This issue does not affect systems running OS X Mavericks v10.9 or later. CVE-ID CVE-2013-5178 : Jesse Ruderman of Mozilla Corporation, Stephane Sudre of Intego NVIDIA Drivers Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: Executing a malicious application could result in arbitrary code execution within the graphics card Description: An issue existed that allowed writes to some trusted memory on the graphics card. This issue was addressed by removing the ability of the host to write to that memory. CVE-ID CVE-2013-5986 : Marcin Kościelnicki from the X.Org Foundation Nouveau project CVE-2013-5987 : Marcin Kościelnicki from the X.Org Foundation Nouveau project PHP Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: Multiple vulnerabilities in PHP Description: Multiple vulnerabilities existed in PHP, the most serious of which may have led to arbitrary code execution. These issues were addressed by updating PHP to version 5.4.22 on OS X Mavericks v10.9, and 5.3.28 on OS X Lion and Mountain Lion. CVE-ID CVE-2013-4073 CVE-2013-4113 CVE-2013-4248 CVE-2013-6420 QuickLook Available for: OS X Mountain Lion v10.8.5 Impact: Downloading a maliciously crafted Microsoft Office file may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in QuickLook's handling of Microsoft Office files. Downloading a maliciously crafted Microsoft Office file may have led to an unexpected application termination or arbitrary code execution. This issue does not affect systems running OS X Mavericks 10.9 or later. CVE-ID CVE-2014-1260 : Felix Groebert of the Google Security Team QuickLook Available for: OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: Downloading a maliciously crafted Microsoft Word document may lead to an unexpected application termination or arbitrary code execution Description: A double free issue existed in QuickLook's handling of Microsoft Word documents. This issue was addressed through improved memory management. CVE-ID CVE-2014-1252 : Felix Groebert of the Google Security Team QuickTime Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: Playing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the handling of 'ftab' atoms. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-1246 : An anonymous researcher working with HP's Zero Day Initiative QuickTime Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: Playing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in the handling of 'dref' atoms. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-1247 : Tom Gallagher & Paul Bates working with HP's Zero Day Initiative QuickTime Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: Playing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the handling of 'ldat' atoms. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-1248 : Jason Kratzer working with iDefense VCP QuickTime Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: Viewing a maliciously crafted PSD image may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the handling of PSD images. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-1249 : dragonltx of Tencent Security Team QuickTime Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: Playing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: An out of bounds byte swapping issue existed in the handling of 'ttfo' elements. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-1250 : Jason Kratzer working with iDefense VCP QuickTime Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: Playing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: A signedness issue existed in the handling of 'stsz' atoms. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-1245 : Tom Gallagher & Paul Bates working with HP's Zero Day Initiative Secure Transport Available for: OS X Mountain Lion v10.8.5 Impact: An attacker may be able to decrypt data protected by SSL Description: There were known attacks on the confidentiality of SSL 3.0 and TLS 1.0 when a cipher suite used a block cipher in CBC mode. To address these issues for applications using Secure Transport, the 1-byte fragment mitigation was enabled by default for this configuration. CVE-ID CVE-2011-3389 : Juliano Rizzo and Thai Duong OS X Mavericks v10.9.2 includes the content of Safari 7.0.2. OS X Mavericks v10.9.2 and Security Update 2014-001 may be obtained from the Mac App Store or Apple's Software Downloads web site: http://www.apple.com/support/downloads/ Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBAgAGBQJTDNeoAAoJEPefwLHPlZEwaRAP/3i/2qRvNv6JqmE9p48uEyXn mlxwXpMyop+vrgMmuiSP14EGSv06HO04PNUtaWPxm7tVYXu0tMtjDcYdIu40TAy6 U0T6QhRZC/uag1DCvdEOvqRUajKmmPtHTCJ6OsQGtGJHlEM+S5XgxRr7qgfkHMfb OlqFsgpdL/AAiYNfzItN2C+r2Lfwro6LDlxhikpASojlMFQrk8nJ6irRv617anSZ 3DwJW2iJxNfpVrgqA1Nrx1fkrPmeT/8jgGuEP6RaKiWIbfXjRG5BW9WuarMqmaP8 C6XoTaJaqEO9zb7F2uJR0HIYpJd065y/xiYNm91yDWIjdrO3wVgNVPGo1pHVyYsY Y7lcyHUVJortKF8SHquw0j3Ujeugu8iWp6ND/00/4dGvwb0jzrxPUxkEmJ43130O t2Obtxdsaa+ub8cZHDN93WB3FQR5hd+KaeXLJC55q0qYY8o8zqdPqXAlYAP2gUQX iB4Bs7NAh2CNJWNTtk2soTjZOwPvPLSPZ6I3w5i0HVP7HQl5K8chjihAwSeyezCZ q5gxCiK0lBW88AUd9n3L7ZOW2Rg53mh6+RiUL/VQ7TfidoP417VDKum300pZkgNv kBCklX9ya7QeLjOMnbnsTk32qG+TiDPgiGZ5IrK6C6T26dexJWbm8tuwPjy5r8mI aiYIh+SzR0rBdMZRgyzv =+DAJ -----END PGP SIGNATURE----- . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201402-02 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: High Title: NVIDIA Drivers: Privilege Escalation Date: February 02, 2014 Bugs: #493448 ID: 201402-02 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== A NVIDIA drivers bug allows unprivileged user-mode software to access the GPU inappropriately, allowing for privilege escalation. Background ========== The NVIDIA drivers provide X11 and GLX support for NVIDIA graphic boards. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 x11-drivers/nvidia-drivers < 331.20 *>= 304.116 *>= 319.76 >= 331.20 Description =========== The vulnerability is caused due to the driver allowing unprivileged user-mode software to access the GPU. Workaround ========== There is no known workaround at this time. Resolution ========== All NVIDIA Drivers users using the 331 branch should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot -v ">=x11-drivers/nvidia-drivers-331.20" All NVIDIA Drivers users using the 319 branch should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot -v ">=x11-drivers/nvidia-drivers-319.76" All NVIDIA Drivers users using the 304 branch should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot -v ">=x11-drivers/nvidia-drivers-304.116" References ========== [ 1 ] CVE-2013-5986 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5986 [ 2 ] CVE-2013-5987 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5987 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201402-02.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2014 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5

Trust: 2.34

sources: NVD: CVE-2013-5987 // JVNDB: JVNDB-2013-005889 // BID: 64525 // VULHUB: VHN-65989 // PACKETSTORM: 126718 // PACKETSTORM: 126572 // PACKETSTORM: 125427 // PACKETSTORM: 125032

AFFECTED PRODUCTS

vendor:applemodel:mac os xscope:eqversion:10.9.1

Trust: 1.6

vendor:nvidiamodel:gpu driverscope:eqversion:325.00

Trust: 1.0

vendor:nvidiamodel:gpu driverscope:eqversion:331.00

Trust: 1.0

vendor:nvidiamodel:gpu driverscope:eqversion:319.00

Trust: 1.0

vendor:nvidiamodel:gpu driverscope:eqversion:310.00

Trust: 1.0

vendor:nvidiamodel:gpu driverscope:eqversion:304.00

Trust: 1.0

vendor:nvidiamodel:gpu display driverscope:eqversion:304

Trust: 0.8

vendor:nvidiamodel:gpu display driverscope:eqversion:310

Trust: 0.8

vendor:nvidiamodel:gpu display driverscope:eqversion:319

Trust: 0.8

vendor:nvidiamodel:gpu display driverscope:eqversion:325

Trust: 0.8

vendor:nvidiamodel:gpu display driverscope:eqversion:331

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.7.5

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.8.5

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.9

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.9.1

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.7.5

Trust: 0.8

vendor:fujitsumodel:fmv-celsiusscope:eqversion:compact model

Trust: 0.8

vendor:fujitsumodel:fmv-celsiusscope:eqversion:tower / mini tower / rack mount model

Trust: 0.8

vendor:fujitsumodel:fmv-celsiusscope:eqversion:mobile workstation

Trust: 0.8

vendor:fujitsumodel:fmv-esprimoscope:eqversion:d series d583/h

Trust: 0.8

vendor:fujitsumodel:fmv-esprimoscope:eqversion:d series d753/h

Trust: 0.8

vendor:fujitsumodel:fmv-lifebookscope:eqversion:fmv-h8240

Trust: 0.8

vendor:fujitsumodel:fmv-lifebookscope:eqversion:fmv-h8250

Trust: 0.8

vendor:fujitsumodel:fmv-lifebookscope:eqversion:fmv-h8260

Trust: 0.8

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

sources: BID: 64525 // JVNDB: JVNDB-2013-005889 // CNNVD: CNNVD-201312-572 // NVD: CVE-2013-5987

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-5987
value: HIGH

Trust: 1.0

NVD: CVE-2013-5987
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201312-572
value: HIGH

Trust: 0.6

VULHUB: VHN-65989
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2013-5987
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-65989
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-65989 // JVNDB: JVNDB-2013-005889 // CNNVD: CNNVD-201312-572 // NVD: CVE-2013-5987

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

sources: NVD: CVE-2013-5987

THREAT TYPE

local

Trust: 0.9

sources: BID: 64525 // CNNVD: CNNVD-201312-572

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-201312-572

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-005889

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-65989

PATCH

title:APPLE-SA-2014-02-25-1url:http://lists.apple.com/archives/security-announce/2014/Feb/msg00000.html

Trust: 0.8

title:HT6150url:http://support.apple.com/kb/HT6150

Trust: 0.8

title:HT6150url:http://support.apple.com/kb/HT6150?viewlocale=ja_JP

Trust: 0.8

title:Unprivileged GPU access vulnerability - CVE-2013-5987url:http://nvidia.custhelp.com/app/answers/detail/a_id/3377

Trust: 0.8

title:NVIDIA社ディスプレイドライバーの脆弱性に関するお知らせurl:http://www.fmworld.net/biz/common/nvidia/20131218.html

Trust: 0.8

sources: JVNDB: JVNDB-2013-005889

EXTERNAL IDS

db:NVDid:CVE-2013-5987

Trust: 3.2

db:BIDid:64525

Trust: 1.0

db:JVNid:JVNVU95868425

Trust: 0.8

db:JVNDBid:JVNDB-2013-005889

Trust: 0.8

db:CNNVDid:CNNVD-201312-572

Trust: 0.7

db:SECUNIAid:55904

Trust: 0.6

db:PACKETSTORMid:126718

Trust: 0.2

db:PACKETSTORMid:126572

Trust: 0.2

db:VULHUBid:VHN-65989

Trust: 0.1

db:PACKETSTORMid:125427

Trust: 0.1

db:PACKETSTORMid:125032

Trust: 0.1

sources: VULHUB: VHN-65989 // BID: 64525 // JVNDB: JVNDB-2013-005889 // PACKETSTORM: 126718 // PACKETSTORM: 126572 // PACKETSTORM: 125427 // PACKETSTORM: 125032 // CNNVD: CNNVD-201312-572 // NVD: CVE-2013-5987

REFERENCES

url:http://nvidia.custhelp.com/app/answers/detail/a_id/3377

Trust: 1.7

url:http://support.apple.com/kb/ht6150

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=139965942001604&w=2

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-5987

Trust: 0.8

url:http://jvn.jp/vu/jvnvu95868425/

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-5987

Trust: 0.8

url:http://secunia.com/advisories/55904

Trust: 0.6

url:http://www.securityfocus.com/bid/64525

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2013-5987

Trust: 0.4

url:http://www.nvidia.com

Trust: 0.3

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/

Trust: 0.2

url:http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Trust: 0.2

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2013-5986

Trust: 0.2

url:http://marc.info/?l=bugtraq&amp;m=139965942001604&amp;w=2

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1255

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-6629

Trust: 0.1

url:http://support.apple.com/kb/ht1222

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5179

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1250

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1245

Trust: 0.1

url:http://www.apple.com/support/downloads/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1259

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1254

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1256

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1258

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1249

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1248

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-6420

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1247

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3389

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-4073

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5178

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5139

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1261

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1896

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1260

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1246

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1862

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1257

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-4248

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-4113

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1252

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5987

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:http://security.gentoo.org/glsa/glsa-201402-02.xml

Trust: 0.1

url:http://security.gentoo.org/

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5986

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

sources: VULHUB: VHN-65989 // BID: 64525 // JVNDB: JVNDB-2013-005889 // PACKETSTORM: 126718 // PACKETSTORM: 126572 // PACKETSTORM: 125427 // PACKETSTORM: 125032 // CNNVD: CNNVD-201312-572 // NVD: CVE-2013-5987

CREDITS

Marcin Koscielnicki of the X.Org Foundation Nouveau project

Trust: 0.9

sources: BID: 64525 // CNNVD: CNNVD-201312-572

SOURCES

db:VULHUBid:VHN-65989
db:BIDid:64525
db:JVNDBid:JVNDB-2013-005889
db:PACKETSTORMid:126718
db:PACKETSTORMid:126572
db:PACKETSTORMid:125427
db:PACKETSTORMid:125032
db:CNNVDid:CNNVD-201312-572
db:NVDid:CVE-2013-5987

LAST UPDATE DATE

2024-11-23T21:16:44.119000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-65989date:2016-08-23T00:00:00
db:BIDid:64525date:2014-05-14T01:51:00
db:JVNDBid:JVNDB-2013-005889date:2014-02-28T00:00:00
db:CNNVDid:CNNVD-201312-572date:2014-04-04T00:00:00
db:NVDid:CVE-2013-5987date:2024-11-21T01:58:33.827

SOURCES RELEASE DATE

db:VULHUBid:VHN-65989date:2014-01-21T00:00:00
db:BIDid:64525date:2013-12-03T00:00:00
db:JVNDBid:JVNDB-2013-005889date:2014-01-24T00:00:00
db:PACKETSTORMid:126718date:2014-05-20T00:00:29
db:PACKETSTORMid:126572date:2014-05-09T23:14:58
db:PACKETSTORMid:125427date:2014-02-26T22:21:07
db:PACKETSTORMid:125032date:2014-02-03T23:09:16
db:CNNVDid:CNNVD-201312-572date:2013-12-31T00:00:00
db:NVDid:CVE-2013-5987date:2014-01-21T18:55:09.710