CVE-2024-0110

4.4 MEDIUM

📋 TL;DR

The NVIDIA CUDA Toolkit's cuobjdump utility contains an out-of-bounds write vulnerability when processing malformed ELF files. This could allow attackers to execute arbitrary code or cause denial of service on affected systems. Users and administrators running CUDA Toolkit with cuobjdump are potentially affected.

💻 Affected Systems

Products:
  • NVIDIA CUDA Toolkit
Versions: All versions prior to CUDA Toolkit 12.4
Operating Systems: Linux, Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems where cuobjdump is installed and accessible. CUDA Toolkit is commonly used for GPU computing in research, AI, and scientific applications.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with the privileges of the cuobjdump process, potentially leading to full system compromise.

🟠

Likely Case

Local denial of service through application crashes when processing malicious ELF files.

🟢

If Mitigated

Limited impact if cuobjdump is not used or access is restricted to trusted users.

🌐 Internet-Facing: LOW - cuobjdump is typically a local utility not exposed to internet.
🏢 Internal Only: MEDIUM - Could be exploited by malicious insiders or through lateral movement if cuobjdump is used in automated workflows.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access or ability to supply malformed ELF files to cuobjdump. No public exploits have been reported.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: CUDA Toolkit 12.4 or later

Vendor Advisory: https://nvidia.custhelp.com/app/answers/detail/a_id/5564

Restart Required: No

Instructions:

1. Download CUDA Toolkit 12.4 or later from NVIDIA's website. 2. Uninstall previous CUDA Toolkit versions. 3. Install the updated version following NVIDIA's installation guide. 4. Verify installation with 'nvcc --version'.

🔧 Temporary Workarounds

Restrict cuobjdump access

linux

Remove execute permissions or restrict access to cuobjdump binary to prevent unauthorized use.

chmod 700 /usr/local/cuda/bin/cuobjdump
chown root:root /usr/local/cuda/bin/cuobjdump

Disable cuobjdump via ACL

windows

Use Windows ACL to deny execute permissions on cuobjdump.exe

icacls "C:\Program Files\NVIDIA GPU Computing Toolkit\CUDA\v12.x\bin\cuobjdump.exe" /deny Everyone:(RX)

🧯 If You Can't Patch

  • Remove execute permissions from cuobjdump binary to prevent exploitation.
  • Implement strict file upload controls to prevent processing of untrusted ELF files.

🔍 How to Verify

Check if Vulnerable:

Check CUDA Toolkit version with 'nvcc --version' or locate cuobjdump and check if version is prior to 12.4.

Check Version:

nvcc --version

Verify Fix Applied:

Verify CUDA Toolkit version is 12.4 or later using 'nvcc --version' command.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected crashes of cuobjdump process
  • High CPU/memory usage by cuobjdump
  • Unusual file processing activity involving ELF files

Network Indicators:

  • None - this is a local file processing vulnerability

SIEM Query:

Process:cuobjdump AND (EventID:1000 OR EventID:1001) OR FilePath:*elf AND Process:cuobjdump

🔗 References

📤 Share & Export