{"id":224684,"date":"2019-11-08T07:48:12","date_gmt":"2019-11-08T06:48:12","guid":{"rendered":"https:\/\/www.borncity.com\/blog\/?p=224684"},"modified":"2023-04-13T11:32:28","modified_gmt":"2023-04-13T09:32:28","slug":"nvidia-schwachstellen-in-geforce-experience-gpu-treiber","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2019\/11\/08\/nvidia-schwachstellen-in-geforce-experience-gpu-treiber\/","title":{"rendered":"Nvidia: Schwachstellen in GeForce Experience- &amp; GPU-Treiber"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" align=\"left\" height=\"47\"\/>[<a href=\"https:\/\/borncity.com\/win\/2019\/11\/08\/nvidia-vulnerabilities-in-geforce-experience-gpu-driver\/\" target=\"_blank\" rel=\"noopener noreferrer\">English<\/a>]Im Nvidia GeForce Experience- und im GPU-Treiber gibt es gleich mehrere gravierende Schwachstellen, die lokalen Angreifern eine Privilegien-Erh\u00f6hung erm\u00f6glicht. Nvidia hat ein Treiberupdate bereitgestellt.<\/p>\n<p><!--more--><\/p>\n<h2>Sicherheitswarnungen zum 7. November 2019<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg07.met.vgwort.de\/na\/0026045f6ba6496487ff22c06ede2b81\" width=\"1\" height=\"1\"\/>In zwei Sicherheitswarnungen zum <a href=\"https:\/\/nvidia.custhelp.com\/app\/answers\/detail\/a_id\/4860\/kw\/Security%20Bulletin\" target=\"_blank\" rel=\"noopener noreferrer\">GeForce Experience-Treiber<\/a> und zum <a href=\"https:\/\/nvidia.custhelp.com\/app\/answers\/detail\/a_id\/4907\/kw\/Security%20Bulletin\" target=\"_blank\" rel=\"noopener noreferrer\">GPU-Treiber<\/a> warnt der Hersteller vor einer Reihe von Schwachstellen. Dieser erm\u00f6glichen lokal eine Erh\u00f6hung der Privilegien, ein Remote-Angriff ist aber nicht m\u00f6glich. <\/p>\n<h2>GeForce Experience-Treiber-Schwachstellen<\/h2>\n<p>Nachfolgend findet sich die Beschreibung der Schwachstellen zum GeForce Experience-Treiber: <\/p>\n<table cellspacing=\"0\" cellpadding=\"2\" width=\"640\" border=\"1\">\n<tbody>\n<tr>\n<td valign=\"top\" width=\"459\"><b>Description<\/b><\/td>\n<td valign=\"top\" width=\"77\"><b>Base Score<\/b><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"103\">CVE\u20112019\u20115701<\/td>\n<td valign=\"top\" width=\"459\">NVIDIA GeForce Experience contains a vulnerability when GameStream is enabled in which an attacker with local system access can load the Intel graphics driver DLLs without validating the path or signature (also known as a binary planting or DLL preloading attack), which may lead to denial of service, information disclosure or escalation of privileges through code execution. <a href=\"https:\/\/nvd.nist.gov\/vuln-metrics\/cvss\/v3-calculator?vector=AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:H\/I:H\/A:H\" target=\"_blank\" rel=\"noopener noreferrer\">AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:H\/I:H\/A<\/a><\/td>\n<td valign=\"top\" width=\"77\">7.8<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"103\">CVE\u20112019\u20115689<\/td>\n<td valign=\"top\" width=\"459\">NVIDIA GeForce Experience contains a vulnerability in the Downloader component in which a user with local system access can craft input that may allow malicious files to be downloaded and saved.This behavior may lead to code execution, denial of service, or information disclosure. <a href=\"https:\/\/web.archive.org\/web\/20220525193639\/https:\/\/nvd.nist.gov\/vuln-metrics\/cvss\/v3-calculator?vector=AV:L\/AC:H\/PR:L\/UI:R\/S:U\/C:H\/I:H\/A:H\" target=\"_blank\" rel=\"noopener noreferrer\">AV:L\/AC:H\/PR:L\/UI:R\/S:U\/C:H\/I:H\/A:H<\/a><\/td>\n<td valign=\"top\" width=\"77\">6.7<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"103\">CVE\u20112019\u20115695<\/td>\n<td valign=\"top\" width=\"459\">NVIDIA GeForce Experience contains a vulnerability in the local service provider component in which an attacker with local system and privileged access can incorrectly loads Windows system DLLs without validating the path or signature (also known as a binary planting or DLL preloading attack), which may lead to denial of service or information disclosure through code execution. <a href=\"https:\/\/web.archive.org\/web\/20220128004917\/https:\/\/nvd.nist.gov\/vuln-metrics\/cvss\/v3-calculator?vector=AV:L\/AC:L\/PR:H\/UI:R\/S:U\/C:H\/I:H\/A:H\" target=\"_blank\" rel=\"noopener noreferrer\">AV:L\/AC:L\/PR:H\/UI:R\/S:U\/C:H\/I:H\/A:H<\/a><\/td>\n<td valign=\"top\" width=\"77\">6.5<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Betroffen sind alle GeForce Experience-Treiberpakete f\u00fcr Windows vor der Version <br \/>3.20.1. Das Update auf die Version 3.20.1 beseitigt diese Schwachstellen.  <\/p>\n<p><a href=\"https:\/\/www.geforce.com\/geforce-experience\/download\" target=\"_blank\" rel=\"noopener noreferrer\">Geforce Experience Treiber-Update<\/a> mit Change-log  <\/p>\n<h2>NVIDIA GPU Display-Treiber-Schwachstellen<\/h2>\n<\/p>\n<p>Nachfolgend findet sich die Beschreibung der Schwachstellen zum NVIDIA GPU Display-Treiber: <\/p>\n<table cellspacing=\"0\" cellpadding=\"2\" width=\"641\" border=\"1\">\n<tbody>\n<tr>\n<td valign=\"top\" width=\"103\"><b>CVE<\/b><\/td>\n<td valign=\"top\" width=\"459\"><b>Description<\/b><\/td>\n<td valign=\"top\" width=\"77\"><b>Base Score<\/b><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"103\">CVE\u20112019\u20115690<\/td>\n<td valign=\"top\" width=\"459\">NVIDIA Windows GPU Display Driver contains a vulnerability in the kernel mode layer (<kbd>nvlddmkm.sys<\/kbd>) handler for <kbd>DxgkDdiEscape<\/kbd> in which the size of an input buffer is not validated, which may lead to denial of service or escalation of privileges.<br \/><a href=\"https:\/\/nvd.nist.gov\/vuln-metrics\/cvss\/v3-calculator?vector=AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:H\/I:H\/A:H\" target=\"_blank\" rel=\"noopener noreferrer\">AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:H\/I:H\/A:H<\/a><\/td>\n<td valign=\"top\" width=\"77\">7.8<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"103\">CVE\u20112019\u20115691<\/td>\n<td valign=\"top\" width=\"459\">NVIDIA Windows GPU Display Driver contains a vulnerability in the kernel mode layer (<kbd>nvlddmkm.sys<\/kbd>) handler for <kbd>DxgkDdiEscape<\/kbd> in which a NULL pointer is dereferenced, which may lead to denial of service or escalation of privileges. <a href=\"https:\/\/nvd.nist.gov\/vuln-metrics\/cvss\/v3-calculator?vector=AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:H\/I:H\/A:H\" target=\"_blank\" rel=\"noopener noreferrer\">AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:H\/I:H\/A:H<\/a><\/td>\n<td valign=\"top\" width=\"77\">7.8<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"103\">CVE\u20112019\u20115692<\/td>\n<td valign=\"top\" width=\"459\">NVIDIA Windows GPU Display Driver contains a vulnerability in the kernel mode layer (<kbd>nvlddmkm.sys<\/kbd>) handler for <kbd>DxgkDdiEscape<\/kbd> in which the product uses untrusted input when calculating or using an array index, which may lead to escalation of privileges or denial of service.&nbsp; <a href=\"https:\/\/web.archive.org\/web\/20220814220443\/https:\/\/nvd.nist.gov\/vuln-metrics\/cvss\/v3-calculator?vector=AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:H\/A:H\" target=\"_blank\" rel=\"noopener noreferrer\">AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:H\/A:H<\/a><\/td>\n<td valign=\"top\" width=\"77\">7.1<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"103\">CVE\u20112019\u20115693<\/td>\n<td valign=\"top\" width=\"459\">NVIDIA Windows GPU Display Driver contains a vulnerability in the kernel mode layer (<kbd>nvlddmkm.sys<\/kbd>) in which the program accesses or uses a pointer that has not been initialized, which may lead to denial of service. <a href=\"https:\/\/nvd.nist.gov\/vuln-metrics\/cvss\/v3-calculator?vector=AV:L\/AC:L\/PR:L\/UI:N\/S:C\/C:N\/I:N\/A:H\" target=\"_blank\" rel=\"noopener noreferrer\">AV:L\/AC:L\/PR:L\/UI:N\/S:C\/C:N\/I:N\/A:H<\/a><\/td>\n<td valign=\"top\" width=\"77\">6.5<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"103\">CVE\u20112019\u20115694<\/td>\n<td valign=\"top\" width=\"459\">NVIDIA Windows GPU Display Driver contains a vulnerability in <b>NVIDIA Control Panel<\/b> in which it incorrectly loads Windows system DLLs without validating the path or signature (also known as a binary planting or DLL preloading attack), which may lead to denial of service or information disclosure through code execution. The attacker requires local system access. <a href=\"https:\/\/web.archive.org\/web\/20220128004917\/https:\/\/nvd.nist.gov\/vuln-metrics\/cvss\/v3-calculator?vector=AV:L\/AC:L\/PR:H\/UI:R\/S:U\/C:H\/I:H\/A:H\">AV:L\/AC:L\/PR:H\/UI:R\/S:U\/C:H\/I:H\/A:H<\/a><\/td>\n<td valign=\"top\" width=\"77\">6.5<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"103\">CVE\u20112019\u20115695<\/td>\n<td valign=\"top\" width=\"459\">NVIDIA Windows GPU Display Driver contains a vulnerability in the local service provider component in which an attacker with local system and privileged access can incorrectly load Windows system DLLs without validating the path or signature (also known as a binary planting or DLL preloading attack), which may lead to denial of service or information disclosure through code execution. <a href=\"https:\/\/web.archive.org\/web\/20220128004917\/https:\/\/nvd.nist.gov\/vuln-metrics\/cvss\/v3-calculator?vector=AV:L\/AC:L\/PR:H\/UI:R\/S:U\/C:H\/I:H\/A:H\" target=\"_blank\" rel=\"noopener noreferrer\">AV:L\/AC:L\/PR:H\/UI:R\/S:U\/C:H\/I:H\/A:H<\/a><\/td>\n<td valign=\"top\" width=\"77\">6.5<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"103\">CVE\u20112019\u20115696<\/td>\n<td valign=\"top\" width=\"459\">NVIDIA Virtual GPU Manager contains a vulnerability in which the provision of an incorrectly sized buffer by a guest VM leads to GPU out-of-bound access, which may lead to a denial of service.<br \/><a href=\"https:\/\/web.archive.org\/web\/20220704205320\/https:\/\/nvd.nist.gov\/vuln-metrics\/cvss\/v3-calculator?vector=AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H\" target=\"_blank\" rel=\"noopener noreferrer\">AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H<\/a><\/td>\n<td valign=\"top\" width=\"77\">5.5<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"103\">CVE\u20112019\u20115697<\/td>\n<td valign=\"top\" width=\"459\">NVIDIA Virtual GPU Manager contains a vulnerability in which it may grant a guest access to memory that it does not own, which may lead to information disclosure or denial of service.<br \/><a href=\"https:\/\/web.archive.org\/web\/20220928033124\/https:\/\/nvd.nist.gov\/vuln-metrics\/cvss\/v3-calculator?vector=AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:L\/I:L\/A:L\" target=\"_blank\" rel=\"noopener noreferrer\">AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:L\/I:L\/A:L<\/a><\/td>\n<td valign=\"top\" width=\"77\">5.3<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"103\">CVE\u20112019\u20115698<\/td>\n<td valign=\"top\" width=\"459\">NVIDIA Virtual GPU Manager contains a vulnerability in the vGPU plugin, in which an input index value is incorrectly validated, which may lead to denial of service. <a href=\"https:\/\/web.archive.org\/web\/20221127081751\/https:\/\/nvd.nist.gov\/vuln-metrics\/cvss\/v3-calculator?vector=AV:L\/AC:L\/PR:H\/UI:N\/S:U\/C:N\/I:L\/A:H\">AV:L\/AC:L\/PR:H\/UI:N\/S:U\/C:N\/I:L\/A:H<\/a><\/td>\n<td valign=\"top\" width=\"77\">5.1<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Betroffen sind alle NVIDIA GPU Display-Treiberpakete f\u00fcr Windows aus der nachfolgenden Tabelle.<\/p>\n<table width=\"100%\" border=\"1\">\n<thead>\n<tr>\n<th><b>CVEs Addressed<\/b><\/th>\n<th><b>Software Product<\/b><\/th>\n<th><b>Operating System<\/b><\/th>\n<th><b>Affected Versions<\/b><\/th>\n<th><b>Updated Versions<\/b><\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td rowspan=\"6\">CVE\u20112019\u20115690<br \/>CVE\u20112019\u20115691<br \/>CVE\u20112019\u20115692<br \/>CVE\u20112019\u20115693<br \/>CVE\u20112019\u20115695<\/td>\n<td>GeForce<\/td>\n<td>Windows<\/td>\n<td>All R440 versions prior to 441.12<\/td>\n<td>441.12<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"3\">Quadro, NVS<\/td>\n<td rowspan=\"3\">Windows<\/td>\n<td>All R440 versions prior to 441.12<\/td>\n<td>441.12<\/td>\n<\/tr>\n<tr>\n<td>All R430 versions<\/td>\n<td>Available the week of November 18, 2019<\/td>\n<\/tr>\n<tr>\n<td>All R418 versions<\/td>\n<td>Available the week of November 18, 2019<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"2\">Tesla<\/td>\n<td rowspan=\"2\">Windows<\/td>\n<td>All R440 versions<\/td>\n<td>Available the week of November 18, 2019<\/td>\n<\/tr>\n<tr>\n<td>All R418 versions<\/td>\n<td>Available the week of November 18, 2019<\/td>\n<\/tr>\n<tr>\n<td>CVE\u20112019\u20115690<br \/>CVE\u20112019\u20115691<br \/>CVE\u20112019\u20115692<br \/>CVE\u20112019\u20115693<br \/>CVE\u20112019\u20115694<br \/>CVE\u20112019\u20115695<\/td>\n<td>Quadro, NVS<\/td>\n<td>Windows<\/td>\n<td>All R390 versions<\/td>\n<td>Available the week of November 18, 2019<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Laut obiger Tabelle stehen noch nicht f\u00fcr alle Produkte Treiberupdates zur Verf\u00fcgung, das Update ist f\u00fcr den 18. November 2019 angek\u00fcndigt. <\/p>\n<p><a href=\"https:\/\/www.geforce.com\/geforce-experience\/download\" target=\"_blank\" rel=\"noopener noreferrer\">NVIDIA Driver Treiber-Update-Seite<\/a><\/p>\n<p>Die aktualisierten Treiber sollten \u00fcber Auto-Update bereitgestellt werden, k\u00f6nnen aber auch bei Verf\u00fcgbarkeit \u00fcber die Update-Seiten heruntergeladen werden. Einige Einsch\u00e4tzungen zu den Schwachstellen finden sich auch <a href=\"https:\/\/web.archive.org\/web\/20221223003530\/https:\/\/www.heise.de\/security\/meldung\/Schwachstellen-in-Nvidias-GPU-Treiber-und-Geforce-Experience-gefaehrden-Windows-4580733.html\" target=\"_blank\" rel=\"noopener noreferrer\">hier<\/a>. (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/nvidia-fixes-security-flaws-in-gpu-driver-geforce-experience\/\" target=\"_blank\" rel=\"noopener noreferrer\">via<\/a>)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[English]Im Nvidia GeForce Experience- und im GPU-Treiber gibt es gleich mehrere gravierende Schwachstellen, die lokalen Angreifern eine Privilegien-Erh\u00f6hung erm\u00f6glicht. Nvidia hat ein Treiberupdate bereitgestellt.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[426,7459,301],"tags":[1192,4328,115,4315],"class_list":["post-224684","post","type-post","status-publish","format-standard","hentry","category-sicherheit","category-software","category-windows","tag-nvidia","tag-sicherheit","tag-treiber","tag-update"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/224684","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=224684"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/224684\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=224684"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=224684"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=224684"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}