NVIDIA CUDA toolkit for Linux and Windows contains a vulnerability in cuobjdump, where an attacker may cause an out-of-bounds read by tricking a user into running cuobjdump on a malformed input file. A successful exploit of this vulnerability may lead to limited denial of service, code execution, and limited information disclosure.
                
            References
                    | Link | Resource | 
|---|---|
| https://nvidia.custhelp.com/app/answers/detail/a_id/5456 | Vendor Advisory | 
| https://nvidia.custhelp.com/app/answers/detail/a_id/5456 | Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| AND | 
            
            
 
  | 
    
History
                    21 Nov 2024, 07:49
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : unknown
         v3 : 5.3  | 
| References | () https://nvidia.custhelp.com/app/answers/detail/a_id/5456 - Vendor Advisory | 
02 May 2023, 14:57
| Type | Values Removed | Values Added | 
|---|---|---|
| CWE | CWE-125 | |
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : unknown
         v3 : 6.6  | 
| First Time | 
        
        Nvidia cuda Toolkit
         Nvidia Microsoft Linux linux Kernel Microsoft windows Linux  | 
|
| CPE | cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* cpe:2.3:a:nvidia:cuda_toolkit:*:*:*:*:*:*:*:*  | 
|
| References | (MISC) https://nvidia.custhelp.com/app/answers/detail/a_id/5456 - Vendor Advisory | 
22 Apr 2023, 03:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2023-04-22 03:15
Updated : 2024-11-21 07:49
NVD link : CVE-2023-25513
Mitre link : CVE-2023-25513
CVE.ORG link : CVE-2023-25513
JSON object : View
Products Affected
                nvidia
- cuda_toolkit
 
linux
- linux_kernel
 
microsoft
- windows
 
CWE
                
                    
                        
                        CWE-125
                        
            Out-of-bounds Read
