NVIDIA Windows GPU Display Driver Multiple Vulnerabilities (May 2019)

high Nessus Plugin ID 126049

Synopsis

A display driver installed on the remote Windows host is affected by multiple vulnerabilities.

Description

The NVIDIA GPU display driver software on the remote Windows host is missing a security update. It is, therefore, affected by multiple vulnerabilities:

- An unspecified vulnerability exists in the kernel mode layer (nvvlddmkm.sys) handler for DxgkDdiEscape due to improper synchronization of shared data. An authenticated, local attacker can exploit this, to cause a denial of service, gain elevated privileges or to disclose potentially sensitive information. (CVE-2019-5675)

- A binary planting vulnerability exists due to improper path or signature validation. An authenticated, local attacker can exploit this, via code execution to gain elevated privileges. (CVE-2019-5676)

- A memory corruption vulnerability exists in the kernel mode layer (nvlddmkm.sys) handler for DeviceIoControl. An authenticated, local attacker can exploit this, to cause a denial of service condition. (CVE-2019-5677)

Solution

Upgrade the NVIDIA graphics driver in accordance with the vendor advisory.

See Also

http://www.nessus.org/u?9fd89bc5

Plugin Details

Severity: High

ID: 126049

File Name: nvidia_win_2019_05.nasl

Version: 1.7

Type: local

Agent: windows

Family: Windows

Published: 6/19/2019

Updated: 4/5/2023

Configuration: Enable paranoid mode

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 5.3

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2019-5676

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

CVSS Score Source: CVE-2019-5675

Vulnerability Information

CPE: cpe:/a:nvidia:gpu_driver

Required KB Items: Settings/ParanoidReport, WMI/DisplayDrivers/NVIDIA

Exploit Ease: No known exploits are available

Patch Publication Date: 5/9/2019

Vulnerability Publication Date: 5/9/2019

Reference Information

CVE: CVE-2019-5666, CVE-2019-5675, CVE-2019-5676, CVE-2019-5677