Lucene search

K
cve[email protected]CVE-2022-34667
HistoryNov 19, 2022 - 12:15 a.m.

CVE-2022-34667

2022-11-1900:15:29
CWE-121
CWE-787
web.nvd.nist.gov
51
6
nvidia
cuda
toolkit
cuobjdump
stack-based buffer overflow
vulnerability
denial of service
data integrity
nvd
cve-2022-34667

4.4 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L

5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

31.8%

NVIDIA CUDA Toolkit SDK contains a stack-based buffer overflow vulnerability in cuobjdump, where an unprivileged remote attacker could exploit this buffer overflow condition by persuading a local user to download a specially crafted corrupted file and execute cuobjdump against it locally, which may lead to a limited denial of service and some loss of data integrity for the local user.

Affected configurations

NVD
Node
linuxlinux_kernelMatch-
OR
microsoftwindowsMatch-
AND
nvidiacuda_toolkitRange<11.8

CNA Affected

[
  {
    "vendor": "NVIDIA",
    "product": "NVIDIA CUDA Toolkit",
    "versions": [
      {
        "version": "All versions prior to 11.8",
        "status": "affected"
      }
    ]
  }
]

Social References

More

4.4 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L

5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

31.8%