CVE-2024-0110
📋 TL;DR
The NVIDIA CUDA Toolkit's cuobjdump utility contains an out-of-bounds write vulnerability when processing malformed ELF files. This could allow attackers to execute arbitrary code or cause denial of service on affected systems. Users and administrators running CUDA Toolkit with cuobjdump are potentially affected.
💻 Affected Systems
- NVIDIA CUDA Toolkit
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution with the privileges of the cuobjdump process, potentially leading to full system compromise.
Likely Case
Local denial of service through application crashes when processing malicious ELF files.
If Mitigated
Limited impact if cuobjdump is not used or access is restricted to trusted users.
🎯 Exploit Status
Exploitation requires local access or ability to supply malformed ELF files to cuobjdump. No public exploits have been reported.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: CUDA Toolkit 12.4 or later
Vendor Advisory: https://nvidia.custhelp.com/app/answers/detail/a_id/5564
Restart Required: No
Instructions:
1. Download CUDA Toolkit 12.4 or later from NVIDIA's website. 2. Uninstall previous CUDA Toolkit versions. 3. Install the updated version following NVIDIA's installation guide. 4. Verify installation with 'nvcc --version'.
🔧 Temporary Workarounds
Restrict cuobjdump access
linuxRemove execute permissions or restrict access to cuobjdump binary to prevent unauthorized use.
chmod 700 /usr/local/cuda/bin/cuobjdump
chown root:root /usr/local/cuda/bin/cuobjdump
Disable cuobjdump via ACL
windowsUse Windows ACL to deny execute permissions on cuobjdump.exe
icacls "C:\Program Files\NVIDIA GPU Computing Toolkit\CUDA\v12.x\bin\cuobjdump.exe" /deny Everyone:(RX)
🧯 If You Can't Patch
- Remove execute permissions from cuobjdump binary to prevent exploitation.
- Implement strict file upload controls to prevent processing of untrusted ELF files.
🔍 How to Verify
Check if Vulnerable:
Check CUDA Toolkit version with 'nvcc --version' or locate cuobjdump and check if version is prior to 12.4.
Check Version:
nvcc --version
Verify Fix Applied:
Verify CUDA Toolkit version is 12.4 or later using 'nvcc --version' command.
📡 Detection & Monitoring
Log Indicators:
- Unexpected crashes of cuobjdump process
- High CPU/memory usage by cuobjdump
- Unusual file processing activity involving ELF files
Network Indicators:
- None - this is a local file processing vulnerability
SIEM Query:
Process:cuobjdump AND (EventID:1000 OR EventID:1001) OR FilePath:*elf AND Process:cuobjdump