{"id":11810,"date":"2019-11-08T07:58:05","date_gmt":"2019-11-08T06:58:05","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=11810"},"modified":"2019-11-08T07:58:05","modified_gmt":"2019-11-08T06:58:05","slug":"nvidia-vulnerabilities-in-geforce-experience-gpu-driver","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2019\/11\/08\/nvidia-vulnerabilities-in-geforce-experience-gpu-driver\/","title":{"rendered":"Nvidia: Vulnerabilities in GeForce Experience &amp; GPU driver"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" align=\"left\" height=\"47\">[<a href=\"https:\/\/www.borncity.com\/blog\/2019\/11\/08\/nvidia-schwachstellen-in-geforce-experience-gpu-treiber\/\" target=\"_blank\" rel=\"noopener noreferrer\">German<\/a>]There are several serious vulnerabilities in the Nvidia GeForce Experience and GPU drivers that allow local attackers to increase privileges. Nvidia has provided a driver update.<\/p>\n<p><!--more--><\/p>\n<h2>Security advisory November 7, 2019<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg07.met.vgwort.de\/na\/4081db7a33464646b6e6df2d56fcae04\" width=\"1\" height=\"1\">In two security advisorie about the <a href=\"https:\/\/nvidia.custhelp.com\/app\/answers\/detail\/a_id\/4860\/kw\/Security%20Bulletin\" target=\"_blank\" rel=\"noopener noreferrer\">GeForce Experience driver<\/a> and the <a href=\"https:\/\/nvidia.custhelp.com\/app\/answers\/detail\/a_id\/4907\/kw\/Security%20Bulletin\" target=\"_blank\" rel=\"noopener noreferrer\">GPU driver<\/a>, the manufacturer warns of a number of vulnerabilities. These allow local escalation of privileges, but a remote attack is not possible.&nbsp; <\/p>\n<h2>GeForce Experience Driver Vulnerabilities<\/h2>\n<p>Below is a description of the vulnerabilities of the GeForce Experience driver: <\/p>\n<table cellspacing=\"0\" cellpadding=\"2\" width=\"640\" border=\"1\">\n<tbody>\n<tr>\n<td valign=\"top\" width=\"459\"><b>Description<\/b><\/td>\n<td valign=\"top\" width=\"77\"><b>Base Score<\/b><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"103\">CVE\u20112019\u20115701<\/td>\n<td valign=\"top\" width=\"459\">NVIDIA GeForce Experience contains a vulnerability when GameStream is enabled in which an attacker with local system access can load the Intel graphics driver DLLs without validating the path or signature (also known as a binary planting or DLL preloading attack), which may lead to denial of service, information disclosure or escalation of privileges through code execution. <a href=\"https:\/\/nvd.nist.gov\/vuln-metrics\/cvss\/v3-calculator?vector=AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:H\/I:H\/A:H\" target=\"_blank\" rel=\"noopener noreferrer\">AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:H\/I:H\/A<\/a><\/td>\n<td valign=\"top\" width=\"77\">7.8<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"103\">CVE\u20112019\u20115689<\/td>\n<td valign=\"top\" width=\"459\">NVIDIA GeForce Experience contains a vulnerability in the Downloader component in which a user with local system access can craft input that may allow malicious files to be downloaded and saved.This behavior may lead to code execution, denial of service, or information disclosure. <a href=\"https:\/\/nvd.nist.gov\/vuln-metrics\/cvss\/v3-calculator?vector=AV:L\/AC:H\/PR:L\/UI:R\/S:U\/C:H\/I:H\/A:H\" target=\"_blank\" rel=\"noopener noreferrer\">AV:L\/AC:H\/PR:L\/UI:R\/S:U\/C:H\/I:H\/A:H<\/a><\/td>\n<td valign=\"top\" width=\"77\">6.7<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"103\">CVE\u20112019\u20115695<\/td>\n<td valign=\"top\" width=\"459\">NVIDIA GeForce Experience contains a vulnerability in the local service provider component in which an attacker with local system and privileged access can incorrectly loads Windows system DLLs without validating the path or signature (also known as a binary planting or DLL preloading attack), which may lead to denial of service or information disclosure through code execution. <a href=\"https:\/\/nvd.nist.gov\/vuln-metrics\/cvss\/v3-calculator?vector=AV:L\/AC:L\/PR:H\/UI:R\/S:U\/C:H\/I:H\/A:H\" target=\"_blank\" rel=\"noopener noreferrer\">AV:L\/AC:L\/PR:H\/UI:R\/S:U\/C:H\/I:H\/A:H<\/a><\/td>\n<td valign=\"top\" width=\"77\">6.5<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Affected are all GeForce Experience driver packages for Windows prior to the version <br \/>3.20.1 The update to version 3.20.1 fixes these vulnerabilities. <\/p>\n<p><a href=\"https:\/\/www.geforce.com\/geforce-experience\/download\" target=\"_blank\" rel=\"noopener noreferrer\">Geforce Experience driver update page with change log<\/a>  <\/p>\n<h2>NVIDIA GPU display driver vulnerabilities<\/h2>\n<p>Below is a description of the NVIDIA GPU display driver vulnerabilities: <\/p>\n<table cellspacing=\"0\" cellpadding=\"2\" width=\"641\" border=\"1\">\n<tbody>\n<tr>\n<td valign=\"top\" width=\"103\"><b>CVE<\/b><\/td>\n<td valign=\"top\" width=\"459\"><b>Description<\/b><\/td>\n<td valign=\"top\" width=\"77\"><b>Base Score<\/b><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"103\">CVE\u20112019\u20115690<\/td>\n<td valign=\"top\" width=\"459\">NVIDIA Windows GPU Display Driver contains a vulnerability in the kernel mode layer (<kbd>nvlddmkm.sys<\/kbd>) handler for <kbd>DxgkDdiEscape<\/kbd> in which the size of an input buffer is not validated, which may lead to denial of service or escalation of privileges.<br \/><a href=\"https:\/\/nvd.nist.gov\/vuln-metrics\/cvss\/v3-calculator?vector=AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:H\/I:H\/A:H\" target=\"_blank\" rel=\"noopener noreferrer\">AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:H\/I:H\/A:H<\/a><\/td>\n<td valign=\"top\" width=\"77\">7.8<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"103\">CVE\u20112019\u20115691<\/td>\n<td valign=\"top\" width=\"459\">NVIDIA Windows GPU Display Driver contains a vulnerability in the kernel mode layer (<kbd>nvlddmkm.sys<\/kbd>) handler for <kbd>DxgkDdiEscape<\/kbd> in which a NULL pointer is dereferenced, which may lead to denial of service or escalation of privileges. <a href=\"https:\/\/nvd.nist.gov\/vuln-metrics\/cvss\/v3-calculator?vector=AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:H\/I:H\/A:H\" target=\"_blank\" rel=\"noopener noreferrer\">AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:H\/I:H\/A:H<\/a><\/td>\n<td valign=\"top\" width=\"77\">7.8<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"103\">CVE\u20112019\u20115692<\/td>\n<td valign=\"top\" width=\"459\">NVIDIA Windows GPU Display Driver contains a vulnerability in the kernel mode layer (<kbd>nvlddmkm.sys<\/kbd>) handler for <kbd>DxgkDdiEscape<\/kbd> in which the product uses untrusted input when calculating or using an array index, which may lead to escalation of privileges or denial of service.&nbsp; <a href=\"https:\/\/nvd.nist.gov\/vuln-metrics\/cvss\/v3-calculator?vector=AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:H\/A:H\" target=\"_blank\" rel=\"noopener noreferrer\">AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:H\/A:H<\/a><\/td>\n<td valign=\"top\" width=\"77\">7.1<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"103\">CVE\u20112019\u20115693<\/td>\n<td valign=\"top\" width=\"459\">NVIDIA Windows GPU Display Driver contains a vulnerability in the kernel mode layer (<kbd>nvlddmkm.sys<\/kbd>) in which the program accesses or uses a pointer that has not been initialized, which may lead to denial of service. <a href=\"https:\/\/nvd.nist.gov\/vuln-metrics\/cvss\/v3-calculator?vector=AV:L\/AC:L\/PR:L\/UI:N\/S:C\/C:N\/I:N\/A:H\" target=\"_blank\" rel=\"noopener noreferrer\">AV:L\/AC:L\/PR:L\/UI:N\/S:C\/C:N\/I:N\/A:H<\/a><\/td>\n<td valign=\"top\" width=\"77\">6.5<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"103\">CVE\u20112019\u20115694<\/td>\n<td valign=\"top\" width=\"459\">NVIDIA Windows GPU Display Driver contains a vulnerability in <b>NVIDIA Control Panel<\/b> in which it incorrectly loads Windows system DLLs without validating the path or signature (also known as a binary planting or DLL preloading attack), which may lead to denial of service or information disclosure through code execution. The attacker requires local system access. <a href=\"https:\/\/nvd.nist.gov\/vuln-metrics\/cvss\/v3-calculator?vector=AV:L\/AC:L\/PR:H\/UI:R\/S:U\/C:H\/I:H\/A:H\">AV:L\/AC:L\/PR:H\/UI:R\/S:U\/C:H\/I:H\/A:H<\/a><\/td>\n<td valign=\"top\" width=\"77\">6.5<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"103\">CVE\u20112019\u20115695<\/td>\n<td valign=\"top\" width=\"459\">NVIDIA Windows GPU Display Driver contains a vulnerability in the local service provider component in which an attacker with local system and privileged access can incorrectly load Windows system DLLs without validating the path or signature (also known as a binary planting or DLL preloading attack), which may lead to denial of service or information disclosure through code execution. <a href=\"https:\/\/nvd.nist.gov\/vuln-metrics\/cvss\/v3-calculator?vector=AV:L\/AC:L\/PR:H\/UI:R\/S:U\/C:H\/I:H\/A:H\" target=\"_blank\" rel=\"noopener noreferrer\">AV:L\/AC:L\/PR:H\/UI:R\/S:U\/C:H\/I:H\/A:H<\/a><\/td>\n<td valign=\"top\" width=\"77\">6.5<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"103\">CVE\u20112019\u20115696<\/td>\n<td valign=\"top\" width=\"459\">NVIDIA Virtual GPU Manager contains a vulnerability in which the provision of an incorrectly sized buffer by a guest VM leads to GPU out-of-bound access, which may lead to a denial of service.<br \/><a href=\"https:\/\/nvd.nist.gov\/vuln-metrics\/cvss\/v3-calculator?vector=AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H\" target=\"_blank\" rel=\"noopener noreferrer\">AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H<\/a><\/td>\n<td valign=\"top\" width=\"77\">5.5<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"103\">CVE\u20112019\u20115697<\/td>\n<td valign=\"top\" width=\"459\">NVIDIA Virtual GPU Manager contains a vulnerability in which it may grant a guest access to memory that it does not own, which may lead to information disclosure or denial of service.<br \/><a href=\"https:\/\/nvd.nist.gov\/vuln-metrics\/cvss\/v3-calculator?vector=AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:L\/I:L\/A:L\" target=\"_blank\" rel=\"noopener noreferrer\">AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:L\/I:L\/A:L<\/a><\/td>\n<td valign=\"top\" width=\"77\">5.3<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"103\">CVE\u20112019\u20115698<\/td>\n<td valign=\"top\" width=\"459\">NVIDIA Virtual GPU Manager contains a vulnerability in the vGPU plugin, in which an input index value is incorrectly validated, which may lead to denial of service. <a href=\"https:\/\/nvd.nist.gov\/vuln-metrics\/cvss\/v3-calculator?vector=AV:L\/AC:L\/PR:H\/UI:N\/S:U\/C:N\/I:L\/A:H\">AV:L\/AC:L\/PR:H\/UI:N\/S:U\/C:N\/I:L\/A:H<\/a><\/td>\n<td valign=\"top\" width=\"77\">5.1<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Affected are all NVIDIA GPU display driver packages for Windows from the following table<\/p>\n<table width=\"100%\" border=\"1\">\n<thead>\n<tr>\n<th><b>CVEs Addressed<\/b><\/th>\n<th><b>Software Product<\/b><\/th>\n<th><b>Operating System<\/b><\/th>\n<th><b>Affected Versions<\/b><\/th>\n<th><b>Updated Versions<\/b><\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td rowspan=\"6\">CVE\u20112019\u20115690<br \/>CVE\u20112019\u20115691<br \/>CVE\u20112019\u20115692<br \/>CVE\u20112019\u20115693<br \/>CVE\u20112019\u20115695<\/td>\n<td>GeForce<\/td>\n<td>Windows<\/td>\n<td>All R440 versions prior to 441.12<\/td>\n<td>441.12<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"3\">Quadro, NVS<\/td>\n<td rowspan=\"3\">Windows<\/td>\n<td>All R440 versions prior to 441.12<\/td>\n<td>441.12<\/td>\n<\/tr>\n<tr>\n<td>All R430 versions<\/td>\n<td>Available the week of November 18, 2019<\/td>\n<\/tr>\n<tr>\n<td>All R418 versions<\/td>\n<td>Available the week of November 18, 2019<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"2\">Tesla<\/td>\n<td rowspan=\"2\">Windows<\/td>\n<td>All R440 versions<\/td>\n<td>Available the week of November 18, 2019<\/td>\n<\/tr>\n<tr>\n<td>All R418 versions<\/td>\n<td>Available the week of November 18, 2019<\/td>\n<\/tr>\n<tr>\n<td>CVE\u20112019\u20115690<br \/>CVE\u20112019\u20115691<br \/>CVE\u20112019\u20115692<br \/>CVE\u20112019\u20115693<br \/>CVE\u20112019\u20115694<br \/>CVE\u20112019\u20115695<\/td>\n<td>Quadro, NVS<\/td>\n<td>Windows<\/td>\n<td>All R390 versions<\/td>\n<td>Available the week of November 18, 2019<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>According to the table above, driver updates are not yet available for all products, the update is announced for November 18, 2019. <\/p>\n<p><a href=\"https:\/\/www.geforce.com\/geforce-experience\/download\" target=\"_blank\" rel=\"noopener noreferrer\">NVIDIA Driver Driver Update Page<\/a><\/p>\n<p>The updated drivers should be provided via Auto-Update, but can also be downloaded from the update pages if available. (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/nvidia-fixes-security-flaws-in-gpu-driver-geforce-experience\/\" target=\"_blank\" rel=\"noopener noreferrer\">via<\/a>)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]There are several serious vulnerabilities in the Nvidia GeForce Experience and GPU drivers that allow local attackers to increase privileges. Nvidia has provided a driver update.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[448,580,1547,22],"tags":[784,1079,591,195],"class_list":["post-11810","post","type-post","status-publish","format-standard","hentry","category-devices","category-security","category-software","category-update","tag-nvidia","tag-sicherheit","tag-treiber","tag-update"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/11810","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=11810"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/11810\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=11810"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=11810"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=11810"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}