{"id":13435,"date":"2020-02-29T16:54:16","date_gmt":"2020-02-29T15:54:16","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=13435"},"modified":"2023-05-14T13:56:16","modified_gmt":"2023-05-14T11:56:16","slug":"nvidia-fixes-critical-vulnerability-in-windows-gpu-driver-2-28-2010","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2020\/02\/29\/nvidia-fixes-critical-vulnerability-in-windows-gpu-driver-2-28-2010\/","title":{"rendered":"NVIDIA fixes critical vulnerability in Windows GPU driver (2\/28\/2020)"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" height=\"47\" align=\"left\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/2020\/02\/29\/nvidia-fixt-kritische-schwachstelle-in-windows-gpu-treiber-28-2-2020\/\" target=\"_blank\" rel=\"noopener noreferrer\">German<\/a>]Nvidia has just fixed a critical vulnerability in its Windows GPU graphics driver with an update. The vulnerabilities could lead to privilege escalation and code execution or information theft.<\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg08.met.vgwort.de\/na\/6155d2e14ce54162816d645d89650d87\" alt=\"\" width=\"1\" height=\"1\" \/>The update was released on Friday, February 28, 2020, as I read the following tweet from Bleeping Computer.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p dir=\"ltr\" lang=\"en\">NVIDIA Fixes High Severity Flaw in Windows GPU Display Driver &#8211; by <a href=\"https:\/\/twitter.com\/serghei?ref_src=twsrc%5Etfw\">@serghei<\/a><a href=\"https:\/\/t.co\/9JTqOa0vJE\">https:\/\/t.co\/9JTqOa0vJE<\/a><\/p>\n<p>\u2014 BleepingComputer (@BleepinComputer) <a href=\"https:\/\/twitter.com\/BleepinComputer\/status\/1233486375258853380?ref_src=twsrc%5Etfw\">February 28, 2020<\/a><\/p><\/blockquote>\n<p><span id=\"preserveb8064eb57691417f9d720e106783d6eb\" class=\"wlWriterPreserve\"><script src=\"https:\/\/platform.twitter.com\/widgets.js\" async=\"\" charset=\"utf-8\"><\/script><\/span><\/p>\n<p>The driver update for the GPU graphics driver fixes several security vulnerabilities with high and medium severity.<\/p>\n<h2>The vulnerabilities<\/h2>\n<p>The two vulnerabilities in the Windows GPU graphics drivers have CVSS V3 base ratings of 6.7 to 8.4, while three NVIDIA vGPU software bugs have received a severity rating of between 5.5 and 7.8. On unpatched systems, the following risks arise:<\/p>\n<ul>\n<li>Local attackers can extend their privileges without user interaction.<\/li>\n<li>Local attackers could make unpatched hosts temporarily unusable by triggering denial of service attacks, or execute malicious code or access sensitive information on the target systems.<\/li>\n<\/ul>\n<p>Fortunately, all vulnerabilities require the attacker to be ready to act locally, remote exploitation is not possible. The following table lists the vulnerabilities.<\/p>\n<p><strong>CVEs for NVIDIA GPU Display Driver<\/strong><\/p>\n<table border=\"1\" width=\"640\" cellspacing=\"0\" cellpadding=\"2\">\n<tbody>\n<tr>\n<td valign=\"top\" width=\"120\"><strong>CVE<\/strong><\/td>\n<td valign=\"top\" width=\"451\"><strong>Description<\/strong><\/td>\n<td valign=\"top\" width=\"68\"><strong>Base Score<\/strong><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"120\"><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=2020-5957\" target=\"_blank\" rel=\"noopener noreferrer\">CVE\u20112020\u20115957<\/a><\/td>\n<td valign=\"top\" width=\"451\">NVIDIA Windows GPU Display Driver contains a vulnerability in the NVIDIA Control Panel component in which an attacker with local system access can corrupt a system file, which may lead to denial of service or escalation of privileges.<\/td>\n<td valign=\"top\" width=\"68\">8.4<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"120\"><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=2020-5958\" target=\"_blank\" rel=\"noopener noreferrer\">CVE\u20112020\u20115958<\/a><\/td>\n<td valign=\"top\" width=\"451\">NVIDIA Windows GPU Display Driver contains a vulnerability in the NVIDIA Control Panel component in which an attacker with local system access can plant a malicious DLL file, which may lead to code execution, denial of service, or information disclosure.<\/td>\n<td valign=\"top\" width=\"68\">6.7<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>CVEs for NVIDIA vGPU Software<\/strong><\/p>\n<table border=\"1\" width=\"640\" cellspacing=\"0\" cellpadding=\"2\">\n<tbody>\n<tr>\n<td valign=\"top\" width=\"100\"><strong>CVE<\/strong><\/td>\n<td valign=\"top\" width=\"441\"><strong>Description<\/strong><\/td>\n<td valign=\"top\" width=\"98\"><strong>Base Score<\/strong><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"100\"><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=2020-5959\" target=\"_blank\" rel=\"noopener noreferrer\">CVE\u20112020\u20115959<\/a><\/td>\n<td valign=\"top\" width=\"441\">NVIDIA Virtual GPU Manager contains a vulnerability in the vGPU plugin, in which an input index value is incorrectly validated, which may lead to denial of service.<\/td>\n<td valign=\"top\" width=\"98\">7.8<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"100\"><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=2020-5960\" target=\"_blank\" rel=\"noopener noreferrer\">CVE\u20112020\u20115960<\/a><\/td>\n<td valign=\"top\" width=\"441\">NVIDIA Virtual GPU Manager contains a vulnerability in the kernel module (nvidia.ko), where a null pointer dereference may occur, which may lead to denial of service.<\/td>\n<td valign=\"top\" width=\"98\">6.5<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"100\"><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=2020-5961\" target=\"_blank\" rel=\"noopener noreferrer\">CVE\u20112020\u20115961<\/a><\/td>\n<td valign=\"top\" width=\"441\">NVIDIA vGPU graphics driver for guest OS contains a vulnerability in which an incorrect resource clean up on a failure path can impact the guest VM, leading to denial of service.<\/td>\n<td valign=\"top\" width=\"98\">5.5<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Nvidia has released <a href=\"https:\/\/nvidia.custhelp.com\/app\/answers\/detail\/a_id\/4996\/kw\/Security%20Bulletin\" target=\"_blank\" rel=\"noopener noreferrer\">this security warning<\/a> with more details about these vulnerabilities and the security update. It also lists which driver versions are affected and which updates are available.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]Nvidia has just fixed a critical vulnerability in its Windows GPU graphics driver with an update. The vulnerabilities could lead to privilege escalation and code execution or information theft.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,1547,22,2],"tags":[536,69,1544,195],"class_list":["post-13435","post","type-post","status-publish","format-standard","hentry","category-security","category-software","category-update","category-windows","tag-driver","tag-security","tag-software","tag-update"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/13435","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=13435"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/13435\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=13435"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=13435"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=13435"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}