All the vulnerabilites related to NVIDIA - GPU Display Driver
var-201401-0137
Vulnerability from variot
Unspecified vulnerability in NVIDIA graphics driver Release 331, 325, 319, 310, and 304 allows local users to bypass intended access restrictions for the GPU and gain privileges via unknown vectors. NVIDIA Graphics Drivers are prone to a local privilege-escalation vulnerability. A local attacker may exploit this issue to gain escalated privileges and execute arbitrary code with escalated privileges. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Note: the current version of the following document is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04036775
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c04036775 Version: 1
HPSBHF02946 rev.1 - HP Servers with NVIDIA GPU Computing Driver, Elevation of Privilege
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.
Release Date: 2014-05-09 Last Updated: 2014-05-09
Potential Security Impact: Elevation of privilege
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY A potential security vulnerability has been identified with certain HP servers that use NVIDIA Computing GPU processors. The vulnerability could be exploited resulting in an elevation of privilege.
References: CVE-2013-5987, SSRT101355
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. Server GPU type(s)
DL360 G7 Q4000
SL390s G7 M2050, M2070, M2070Q, M2075, M2090
DL160 Gen8 Q4000
ML350p Gen8 Q4000, Q6000
DL360e Gen8 Q4000
DL380e Gen8 Q4000, Q6000
SL250s Gen8 M2070Q, M2075, M2090, K10, K20, K20X
SL270s Gen8 M2070Q, M2075, M2090, K10, K20, K20X
BACKGROUND
CVSS 2.0 Base Metrics
Reference Base Vector Base Score CVE-2013-5987 (AV:L/AC:M/Au:S/C:C/I:C/A:C) 6.6 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002
The Hewlett-Packard Company thanks NVIDIA and Marcin Kocielnicki from the X.Org Foundation Nouveau project for reporting this issue to security-alert@hp.com.
RESOLUTION
HP has provided an updated NVIDIA firmware driver version that resolves the security vulnerability. Download the firmware driver from hp.com
Go to support and drivers. Search for the server model and then choose the operating system. Select "Driver - NVIDIA Computing."
Note:
For Windows choose the Driver NVIDIA Computing v3.21.01 or a subsequent version For Linux choose the Driver NVIDIA Computing v3.19.72 or a subsequent version
HISTORY Version:1 (rev.1) - 9 May 2014 Initial release
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.
3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX
Copyright 2014 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners.
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.13 (GNU/Linux)
iEYEARECAAYFAlNtE/EACgkQ4B86/C0qfVmMDwCgoDqC5FS8nW8RTOHZAUUqCZIY 0uIAn0TrMahIzRFsCo6DfAc8/FsNsz6f =mv1t -----END PGP SIGNATURE----- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
APPLE-SA-2014-02-25-1 OS X Mavericks 10.9.2 and Security Update 2014-001
OS X Mavericks 10.9.2 and Security Update 2014-001 is now available and addresses the following:
Apache Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: Multiple vulnerabilities in Apache Description: Multiple vulnerabilities existed in Apache, the most serious of which may lead to cross-site scripting. These issues were addressed by updating Apache to version 2.2.26. CVE-ID CVE-2013-1862 CVE-2013-1896
App Sandbox Available for: OS X Mountain Lion v10.8.5 Impact: The App Sandbox may be bypassed Description: The LaunchServices interface for launching an application allowed sandboxed apps to specify the list of arguments passed to the new process. A compromised sandboxed application could abuse this to bypass the sandbox. This issue was addressed by preventing sandboxed applications from specifying arguments. This issue does not affect systems running OS X Mavericks 10.9 or later. CVE-ID CVE-2013-5179 : Friedrich Graeter of The Soulmen GbR
ATS Available for: OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: Viewing or downloading a document containing a maliciously crafted embedded font may lead to arbitrary code execution Description: A memory corruption issue existed in the handling of handling of Type 1 fonts. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-1254 : Felix Groebert of the Google Security Team
ATS Available for: OS X Mavericks 10.9 and 10.9.1 Impact: The App Sandbox may be bypassed Description: A memory corruption issue existed in the handling of Mach messages passed to ATS. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-1262 : Meder Kydyraliev of the Google Security Team
ATS Available for: OS X Mavericks 10.9 and 10.9.1 Impact: The App Sandbox may be bypassed Description: An arbitrary free issue existed in the handling of Mach messages passed to ATS. This issue was addressed through additional validation of Mach messages. CVE-ID CVE-2014-1255 : Meder Kydyraliev of the Google Security Team
ATS Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: The App Sandbox may be bypassed Description: A buffer overflow issue existed in the handling of Mach messages passed to ATS. This issue was addressed by additional bounds checking. CVE-ID CVE-2014-1256 : Meder Kydyraliev of the Google Security Team
Certificate Trust Policy Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: Root certificates have been updated Description: The set of system root certificates has been updated. The complete list of recognized system roots may be viewed via the Keychain Access application.
CFNetwork Cookies Available for: OS X Mountain Lion v10.8.5 Impact: Session cookies may persist even after resetting Safari Description: Resetting Safari did not always delete session cookies until Safari was closed. This issue was addressed through improved handling of session cookies. This issue does not affect systems running OS X Mavericks 10.9 or later. CVE-ID CVE-2014-1257 : Rob Ansaldo of Amherst College, Graham Bennett
CoreAnimation Available for: OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: Visiting a maliciously crafted site may lead to an unexpected application termination or arbitrary code execution Description: A heap buffer overflow existed in CoreAnimation's handling of images. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-1258 : Karl Smith of NCC Group
CoreText Available for: OS X Mavericks 10.9 and 10.9.1 Impact: Applications that use CoreText may be vulnerable to an unexpected application termination or arbitrary code execution Description: A signedness issue existed in CoreText in the handling of Unicode fonts. This issue is addressed through improved bounds checking. CVE-ID CVE-2014-1261 : Lucas Apa and Carlos Mario Penagos of IOActive Labs
curl Available for: OS X Mavericks 10.9 and 10.9.1 Impact: An attacker with a privileged network position may intercept user credentials or other sensitive information Description: When using curl to connect to an HTTPS URL containing an IP address, the IP address was not validated against the certificate. This issue does not affect systems prior to OS X Mavericks v10.9. CVE-ID CVE-2014-1263 : Roland Moriz of Moriz GmbH
Data Security Available for: OS X Mavericks 10.9 and 10.9.1 Impact: An attacker with a privileged network position may capture or modify data in sessions protected by SSL/TLS Description: Secure Transport failed to validate the authenticity of the connection. This issue was addressed by restoring missing validation steps. CVE-ID CVE-2014-1266
Date and Time Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: An unprivileged user may change the system clock Description: This update changes the behavior of the systemsetup command to require administrator privileges to change the system clock. CVE-ID CVE-2014-1265
File Bookmark Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: Viewing a file with a maliciously crafted name may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the handling of file names. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-1259
Finder Available for: OS X Mavericks 10.9 and 10.9.1 Impact: Accessing a file's ACL via Finder may lead to other users gaining unauthorized access to files Description: Accessing a file's ACL via Finder may corrupt the ACLs on the file. This issue was addressed through improved handling of ACLs. CVE-ID CVE-2014-1264
ImageIO Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: Viewing a maliciously crafted JPEG file may lead to the disclosure of memory contents Description: An uninitialized memory access issue existed in libjpeg's handling of JPEG markers, resulting in the disclosure of memory contents. This issue was addressed by better JPEG handling. CVE-ID CVE-2013-6629 : Michal Zalewski
IOSerialFamily Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5 Impact: Executing a malicious application may result in arbitrary code execution within the kernel Description: An out of bounds array access existed in the IOSerialFamily driver. This issue was addressed through additional bounds checking. This issue does not affect systems running OS X Mavericks v10.9 or later. CVE-ID CVE-2013-5139 : @dent1zt
LaunchServices Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5 Impact: A file could show the wrong extension Description: An issue existed in the handling of certain unicode characters that could allow filenames to show incorrect extensions. The issue was addressed by filtering unsafe unicode characters from display in filenames. This issue does not affect systems running OS X Mavericks v10.9 or later. CVE-ID CVE-2013-5178 : Jesse Ruderman of Mozilla Corporation, Stephane Sudre of Intego
NVIDIA Drivers Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: Executing a malicious application could result in arbitrary code execution within the graphics card Description: An issue existed that allowed writes to some trusted memory on the graphics card. This issue was addressed by removing the ability of the host to write to that memory. CVE-ID CVE-2013-5986 : Marcin Kościelnicki from the X.Org Foundation Nouveau project CVE-2013-5987 : Marcin Kościelnicki from the X.Org Foundation Nouveau project
PHP Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: Multiple vulnerabilities in PHP Description: Multiple vulnerabilities existed in PHP, the most serious of which may have led to arbitrary code execution. These issues were addressed by updating PHP to version 5.4.22 on OS X Mavericks v10.9, and 5.3.28 on OS X Lion and Mountain Lion. CVE-ID CVE-2013-4073 CVE-2013-4113 CVE-2013-4248 CVE-2013-6420
QuickLook Available for: OS X Mountain Lion v10.8.5 Impact: Downloading a maliciously crafted Microsoft Office file may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in QuickLook's handling of Microsoft Office files. Downloading a maliciously crafted Microsoft Office file may have led to an unexpected application termination or arbitrary code execution. This issue does not affect systems running OS X Mavericks 10.9 or later. CVE-ID CVE-2014-1260 : Felix Groebert of the Google Security Team
QuickLook Available for: OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: Downloading a maliciously crafted Microsoft Word document may lead to an unexpected application termination or arbitrary code execution Description: A double free issue existed in QuickLook's handling of Microsoft Word documents. This issue was addressed through improved memory management. CVE-ID CVE-2014-1252 : Felix Groebert of the Google Security Team
QuickTime Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: Playing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the handling of 'ftab' atoms. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-1246 : An anonymous researcher working with HP's Zero Day Initiative
QuickTime Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: Playing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in the handling of 'dref' atoms. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-1247 : Tom Gallagher & Paul Bates working with HP's Zero Day Initiative
QuickTime Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: Playing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the handling of 'ldat' atoms. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-1248 : Jason Kratzer working with iDefense VCP
QuickTime Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: Viewing a maliciously crafted PSD image may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the handling of PSD images. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-1249 : dragonltx of Tencent Security Team
QuickTime Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: Playing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: An out of bounds byte swapping issue existed in the handling of 'ttfo' elements. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-1250 : Jason Kratzer working with iDefense VCP
QuickTime Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1 Impact: Playing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: A signedness issue existed in the handling of 'stsz' atoms. This issue was addressed through improved bounds checking. CVE-ID CVE-2014-1245 : Tom Gallagher & Paul Bates working with HP's Zero Day Initiative
Secure Transport Available for: OS X Mountain Lion v10.8.5 Impact: An attacker may be able to decrypt data protected by SSL Description: There were known attacks on the confidentiality of SSL 3.0 and TLS 1.0 when a cipher suite used a block cipher in CBC mode. To address these issues for applications using Secure Transport, the 1-byte fragment mitigation was enabled by default for this configuration. CVE-ID CVE-2011-3389 : Juliano Rizzo and Thai Duong
OS X Mavericks v10.9.2 includes the content of Safari 7.0.2.
OS X Mavericks v10.9.2 and Security Update 2014-001 may be obtained from the Mac App Store or Apple's Software Downloads web site: http://www.apple.com/support/downloads/
Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222
This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIcBAEBAgAGBQJTDNeoAAoJEPefwLHPlZEwaRAP/3i/2qRvNv6JqmE9p48uEyXn mlxwXpMyop+vrgMmuiSP14EGSv06HO04PNUtaWPxm7tVYXu0tMtjDcYdIu40TAy6 U0T6QhRZC/uag1DCvdEOvqRUajKmmPtHTCJ6OsQGtGJHlEM+S5XgxRr7qgfkHMfb OlqFsgpdL/AAiYNfzItN2C+r2Lfwro6LDlxhikpASojlMFQrk8nJ6irRv617anSZ 3DwJW2iJxNfpVrgqA1Nrx1fkrPmeT/8jgGuEP6RaKiWIbfXjRG5BW9WuarMqmaP8 C6XoTaJaqEO9zb7F2uJR0HIYpJd065y/xiYNm91yDWIjdrO3wVgNVPGo1pHVyYsY Y7lcyHUVJortKF8SHquw0j3Ujeugu8iWp6ND/00/4dGvwb0jzrxPUxkEmJ43130O t2Obtxdsaa+ub8cZHDN93WB3FQR5hd+KaeXLJC55q0qYY8o8zqdPqXAlYAP2gUQX iB4Bs7NAh2CNJWNTtk2soTjZOwPvPLSPZ6I3w5i0HVP7HQl5K8chjihAwSeyezCZ q5gxCiK0lBW88AUd9n3L7ZOW2Rg53mh6+RiUL/VQ7TfidoP417VDKum300pZkgNv kBCklX9ya7QeLjOMnbnsTk32qG+TiDPgiGZ5IrK6C6T26dexJWbm8tuwPjy5r8mI aiYIh+SzR0rBdMZRgyzv =+DAJ -----END PGP SIGNATURE----- . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201402-02
http://security.gentoo.org/
Severity: High Title: NVIDIA Drivers: Privilege Escalation Date: February 02, 2014 Bugs: #493448 ID: 201402-02
Synopsis
A NVIDIA drivers bug allows unprivileged user-mode software to access the GPU inappropriately, allowing for privilege escalation.
Background
The NVIDIA drivers provide X11 and GLX support for NVIDIA graphic boards.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 x11-drivers/nvidia-drivers < 331.20 >= 304.116 >= 319.76 >= 331.20
Description
The vulnerability is caused due to the driver allowing unprivileged user-mode software to access the GPU.
Workaround
There is no known workaround at this time.
Resolution
All NVIDIA Drivers users using the 331 branch should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot -v ">=x11-drivers/nvidia-drivers-331.20"
All NVIDIA Drivers users using the 319 branch should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot -v ">=x11-drivers/nvidia-drivers-319.76"
All NVIDIA Drivers users using the 304 branch should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot -v ">=x11-drivers/nvidia-drivers-304.116"
References
[ 1 ] CVE-2013-5986 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5986 [ 2 ] CVE-2013-5987 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5987
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201402-02.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2014 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201401-0137", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "mac os x", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "10.9.1" }, { "model": "gpu driver", "scope": "eq", "trust": 1.0, "vendor": "nvidia", "version": "310.00" }, { "model": "gpu driver", "scope": "eq", "trust": 1.0, "vendor": "nvidia", "version": "319.00" }, { "model": "gpu driver", "scope": "eq", "trust": 1.0, "vendor": "nvidia", "version": "325.00" }, { "model": "gpu driver", "scope": "eq", "trust": 1.0, "vendor": "nvidia", "version": "304.00" }, { "model": "gpu driver", "scope": "eq", "trust": 1.0, "vendor": "nvidia", "version": "331.00" }, { "model": "gpu display driver", "scope": "eq", "trust": 0.8, "vendor": "nvidia", "version": "304" }, { "model": "gpu display driver", "scope": "eq", "trust": 0.8, "vendor": "nvidia", "version": "310" }, { "model": "gpu display driver", "scope": "eq", "trust": 0.8, "vendor": "nvidia", "version": "319" }, { "model": "gpu display driver", "scope": "eq", "trust": 0.8, "vendor": "nvidia", "version": "325" }, { "model": "gpu display driver", "scope": "eq", "trust": 0.8, "vendor": "nvidia", "version": "331" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.7.5" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.8.5" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.9" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.9.1" }, { "model": "mac os x server", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.7.5" }, { "model": "fmv-celsius", "scope": "eq", "trust": 0.8, "vendor": "fujitsu", "version": "compact model" }, { "model": "fmv-celsius", "scope": "eq", "trust": 0.8, "vendor": "fujitsu", "version": "tower / mini tower / rack mount model" }, { "model": "fmv-celsius", "scope": "eq", "trust": 0.8, "vendor": "fujitsu", "version": "mobile workstation" }, { "model": "fmv-esprimo", "scope": "eq", "trust": 0.8, "vendor": "fujitsu", "version": "d series d583/h" }, { "model": "fmv-esprimo", "scope": "eq", "trust": 0.8, "vendor": "fujitsu", "version": "d series d753/h" }, { "model": "fmv-lifebook", "scope": "eq", "trust": 0.8, "vendor": "fujitsu", "version": "fmv-h8240" }, { "model": "fmv-lifebook", "scope": "eq", "trust": 0.8, "vendor": "fujitsu", "version": "fmv-h8250" }, { "model": "fmv-lifebook", "scope": "eq", "trust": 0.8, "vendor": "fujitsu", "version": "fmv-h8260" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null } ], "sources": [ { "db": "BID", "id": "64525" }, { "db": "JVNDB", "id": "JVNDB-2013-005889" }, { "db": "NVD", "id": "CVE-2013-5987" }, { "db": "CNNVD", "id": "CNNVD-201312-572" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:nvidia:gpu_driver:304.00:-:*:*:windows:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nvidia:gpu_driver:310.00:-:*:*:windows:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nvidia:gpu_driver:325.00:-:*:*:windows:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nvidia:gpu_driver:304.00:-:*:*:unix:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nvidia:gpu_driver:319.00:-:*:*:unix:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nvidia:gpu_driver:331.00:-:*:*:unix:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nvidia:gpu_driver:319.00:-:*:*:windows:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nvidia:gpu_driver:331.00:-:*:*:windows:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.9.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2013-5987" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Marcin Koscielnicki of the X.Org Foundation Nouveau project", "sources": [ { "db": "BID", "id": "64525" }, { "db": "CNNVD", "id": "CNNVD-201312-572" } ], "trust": 0.9 }, "cve": "CVE-2013-5987", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": true, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.2, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2013-5987", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "VHN-65989", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2013-5987", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201312-572", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-65989", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-65989" }, { "db": "JVNDB", "id": "JVNDB-2013-005889" }, { "db": "NVD", "id": "CVE-2013-5987" }, { "db": "CNNVD", "id": "CNNVD-201312-572" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Unspecified vulnerability in NVIDIA graphics driver Release 331, 325, 319, 310, and 304 allows local users to bypass intended access restrictions for the GPU and gain privileges via unknown vectors. NVIDIA Graphics Drivers are prone to a local privilege-escalation vulnerability. \nA local attacker may exploit this issue to gain escalated privileges and execute arbitrary code with escalated privileges. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nNote: the current version of the following document is available here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/\ndocDisplay?docId=emr_na-c04036775\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: c04036775\nVersion: 1\n\nHPSBHF02946 rev.1 - HP Servers with NVIDIA GPU Computing Driver, Elevation of\nPrivilege\n\nNOTICE: The information in this Security Bulletin should be acted upon as\nsoon as possible. \n\nRelease Date: 2014-05-09\nLast Updated: 2014-05-09\n\nPotential Security Impact: Elevation of privilege\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nA potential security vulnerability has been identified with certain HP\nservers that use NVIDIA Computing GPU processors. The vulnerability could be\nexploited resulting in an elevation of privilege. \n\nReferences: CVE-2013-5987, SSRT101355\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \nServer\n GPU type(s)\n\nDL360 G7\n Q4000\n\nSL390s G7\n M2050, M2070, M2070Q, M2075, M2090\n\nDL160 Gen8\n Q4000\n\nML350p Gen8\n Q4000, Q6000\n\nDL360e Gen8\n Q4000\n\nDL380e Gen8\n Q4000, Q6000\n\nSL250s Gen8\n M2070Q, M2075, M2090, K10, K20, K20X\n\nSL270s Gen8\n M2070Q, M2075, M2090, K10, K20, K20X\n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n Reference Base Vector Base Score\nCVE-2013-5987 (AV:L/AC:M/Au:S/C:C/I:C/A:C) 6.6\n===========================================================\n Information on CVSS is documented\n in HP Customer Notice: HPSN-2008-002\n\nThe Hewlett-Packard Company thanks NVIDIA and Marcin Kocielnicki from the\nX.Org Foundation Nouveau project for reporting this issue to\nsecurity-alert@hp.com. \n\nRESOLUTION\n\nHP has provided an updated NVIDIA firmware driver version that resolves the\nsecurity vulnerability. Download the firmware driver from hp.com\n\nGo to support and drivers. \nSearch for the server model and then choose the operating system. \nSelect \"Driver - NVIDIA Computing.\"\n\nNote:\n\nFor Windows choose the Driver NVIDIA Computing v3.21.01 or a subsequent\nversion\nFor Linux choose the Driver NVIDIA Computing v3.19.72 or a subsequent version\n\nHISTORY\nVersion:1 (rev.1) - 9 May 2014 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer\u0027s patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HP Services support channel. For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com. \n\nReport: To report a potential security vulnerability with any HP supported\nproduct, send Email to: security-alert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin\nalerts via Email:\nhttp://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HP General Software\nHF = HP Hardware and Firmware\nMP = MPE/iX\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPI = Printing and Imaging\nPV = ProCurve\nST = Storage Software\nTU = Tru64 UNIX\nUX = HP-UX\n\nCopyright 2014 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. The information provided is provided \"as is\"\nwithout warranty of any kind. To the extent permitted by law, neither HP or\nits affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits; damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. \nHewlett-Packard Company and the names of Hewlett-Packard products referenced\nherein are trademarks of Hewlett-Packard Company in the United States and\nother countries. Other product and company names mentioned herein may be\ntrademarks of their respective owners. \n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.13 (GNU/Linux)\n\niEYEARECAAYFAlNtE/EACgkQ4B86/C0qfVmMDwCgoDqC5FS8nW8RTOHZAUUqCZIY\n0uIAn0TrMahIzRFsCo6DfAc8/FsNsz6f\n=mv1t\n-----END PGP SIGNATURE-----\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nAPPLE-SA-2014-02-25-1 OS X Mavericks 10.9.2 and Security Update\n2014-001\n\nOS X Mavericks 10.9.2 and Security Update 2014-001 is now available\nand addresses the following:\n\nApache\nAvailable for: OS X Lion v10.7.5, OS X Lion Server v10.7.5,\nOS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1\nImpact: Multiple vulnerabilities in Apache\nDescription: Multiple vulnerabilities existed in Apache, the most\nserious of which may lead to cross-site scripting. These issues were\naddressed by updating Apache to version 2.2.26. \nCVE-ID\nCVE-2013-1862\nCVE-2013-1896\n\nApp Sandbox\nAvailable for: OS X Mountain Lion v10.8.5\nImpact: The App Sandbox may be bypassed\nDescription: The LaunchServices interface for launching an\napplication allowed sandboxed apps to specify the list of arguments\npassed to the new process. A compromised sandboxed application could\nabuse this to bypass the sandbox. This issue was addressed by\npreventing sandboxed applications from specifying arguments. This\nissue does not affect systems running OS X Mavericks 10.9 or later. \nCVE-ID\nCVE-2013-5179 : Friedrich Graeter of The Soulmen GbR\n\nATS\nAvailable for: OS X Mountain Lion v10.8.5,\nOS X Mavericks 10.9 and 10.9.1\nImpact: Viewing or downloading a document containing a maliciously\ncrafted embedded font may lead to arbitrary code execution\nDescription: A memory corruption issue existed in the handling of\nhandling of Type 1 fonts. This issue was addressed through improved\nbounds checking. \nCVE-ID\nCVE-2014-1254 : Felix Groebert of the Google Security Team\n\nATS\nAvailable for: OS X Mavericks 10.9 and 10.9.1\nImpact: The App Sandbox may be bypassed\nDescription: A memory corruption issue existed in the handling of\nMach messages passed to ATS. This issue was addressed through\nimproved bounds checking. \nCVE-ID\nCVE-2014-1262 : Meder Kydyraliev of the Google Security Team\n\nATS\nAvailable for: OS X Mavericks 10.9 and 10.9.1\nImpact: The App Sandbox may be bypassed\nDescription: An arbitrary free issue existed in the handling of Mach\nmessages passed to ATS. This issue was addressed through additional\nvalidation of Mach messages. \nCVE-ID\nCVE-2014-1255 : Meder Kydyraliev of the Google Security Team\n\nATS\nAvailable for: OS X Lion v10.7.5, OS X Lion Server v10.7.5,\nOS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1\nImpact: The App Sandbox may be bypassed\nDescription: A buffer overflow issue existed in the handling of Mach\nmessages passed to ATS. This issue was addressed by additional bounds\nchecking. \nCVE-ID\nCVE-2014-1256 : Meder Kydyraliev of the Google Security Team\n\nCertificate Trust Policy\nAvailable for: OS X Lion v10.7.5, OS X Lion Server v10.7.5,\nOS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1\nImpact: Root certificates have been updated\nDescription: The set of system root certificates has been updated. \nThe complete list of recognized system roots may be viewed via the\nKeychain Access application. \n\nCFNetwork Cookies\nAvailable for: OS X Mountain Lion v10.8.5\nImpact: Session cookies may persist even after resetting Safari\nDescription: Resetting Safari did not always delete session cookies\nuntil Safari was closed. This issue was addressed through improved\nhandling of session cookies. This issue does not affect systems\nrunning OS X Mavericks 10.9 or later. \nCVE-ID\nCVE-2014-1257 : Rob Ansaldo of Amherst College, Graham Bennett\n\nCoreAnimation\nAvailable for: OS X Mountain Lion v10.8.5,\nOS X Mavericks 10.9 and 10.9.1\nImpact: Visiting a maliciously crafted site may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A heap buffer overflow existed in CoreAnimation\u0027s\nhandling of images. This issue was addressed through improved bounds\nchecking. \nCVE-ID\nCVE-2014-1258 : Karl Smith of NCC Group\n\nCoreText\nAvailable for: OS X Mavericks 10.9 and 10.9.1\nImpact: Applications that use CoreText may be vulnerable to an\nunexpected application termination or arbitrary code execution\nDescription: A signedness issue existed in CoreText in the handling\nof Unicode fonts. This issue is addressed through improved bounds\nchecking. \nCVE-ID\nCVE-2014-1261 : Lucas Apa and Carlos Mario Penagos of IOActive Labs\n\ncurl\nAvailable for: OS X Mavericks 10.9 and 10.9.1\nImpact: An attacker with a privileged network position may intercept\nuser credentials or other sensitive information\nDescription: When using curl to connect to an HTTPS URL containing\nan IP address, the IP address was not validated against the\ncertificate. This issue does not affect systems prior to OS X\nMavericks v10.9. \nCVE-ID\nCVE-2014-1263 : Roland Moriz of Moriz GmbH\n\nData Security\nAvailable for: OS X Mavericks 10.9 and 10.9.1\nImpact: An attacker with a privileged network position may capture\nor modify data in sessions protected by SSL/TLS\nDescription: Secure Transport failed to validate the authenticity of\nthe connection. This issue was addressed by restoring missing\nvalidation steps. \nCVE-ID\nCVE-2014-1266\n\nDate and Time\nAvailable for: OS X Lion v10.7.5, OS X Lion Server v10.7.5,\nOS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1\nImpact: An unprivileged user may change the system clock\nDescription: This update changes the behavior of the systemsetup\ncommand to require administrator privileges to change the system\nclock. \nCVE-ID\nCVE-2014-1265\n\nFile Bookmark\nAvailable for: OS X Lion v10.7.5, OS X Lion Server v10.7.5,\nOS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1\nImpact: Viewing a file with a maliciously crafted name may lead to\nan unexpected application termination or arbitrary code execution\nDescription: A buffer overflow existed in the handling of file\nnames. This issue was addressed through improved bounds checking. \nCVE-ID\nCVE-2014-1259\n\nFinder\nAvailable for: OS X Mavericks 10.9 and 10.9.1\nImpact: Accessing a file\u0027s ACL via Finder may lead to other users\ngaining unauthorized access to files\nDescription: Accessing a file\u0027s ACL via Finder may corrupt the ACLs\non the file. This issue was addressed through improved handling of\nACLs. \nCVE-ID\nCVE-2014-1264\n\nImageIO\nAvailable for: OS X Lion v10.7.5, OS X Lion Server v10.7.5,\nOS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1\nImpact: Viewing a maliciously crafted JPEG file may lead to the\ndisclosure of memory contents\nDescription: An uninitialized memory access issue existed in\nlibjpeg\u0027s handling of JPEG markers, resulting in the disclosure of\nmemory contents. This issue was addressed by better JPEG handling. \nCVE-ID\nCVE-2013-6629 : Michal Zalewski\n\nIOSerialFamily\nAvailable for: OS X Lion v10.7.5, OS X Lion Server v10.7.5,\nOS X Mountain Lion v10.8.5\nImpact: Executing a malicious application may result in arbitrary\ncode execution within the kernel\nDescription: An out of bounds array access existed in the\nIOSerialFamily driver. This issue was addressed through additional\nbounds checking. This issue does not affect systems running OS X\nMavericks v10.9 or later. \nCVE-ID\nCVE-2013-5139 : @dent1zt\n\nLaunchServices\nAvailable for: OS X Lion v10.7.5, OS X Lion Server v10.7.5,\nOS X Mountain Lion v10.8.5\nImpact: A file could show the wrong extension\nDescription: An issue existed in the handling of certain unicode\ncharacters that could allow filenames to show incorrect extensions. \nThe issue was addressed by filtering unsafe unicode characters from\ndisplay in filenames. This issue does not affect systems running OS X\nMavericks v10.9 or later. \nCVE-ID\nCVE-2013-5178 : Jesse Ruderman of Mozilla Corporation, Stephane Sudre\nof Intego\n\nNVIDIA Drivers\nAvailable for: OS X Lion v10.7.5, OS X Lion Server v10.7.5,\nOS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1\nImpact: Executing a malicious application could result in arbitrary\ncode execution within the graphics card\nDescription: An issue existed that allowed writes to some trusted\nmemory on the graphics card. This issue was addressed by removing the\nability of the host to write to that memory. \nCVE-ID\nCVE-2013-5986 : Marcin Ko\u015bcielnicki from the X.Org Foundation\nNouveau project\nCVE-2013-5987 : Marcin Ko\u015bcielnicki from the X.Org Foundation\nNouveau project\n\nPHP\nAvailable for: OS X Lion v10.7.5, OS X Lion Server v10.7.5,\nOS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1\nImpact: Multiple vulnerabilities in PHP\nDescription: Multiple vulnerabilities existed in PHP, the most\nserious of which may have led to arbitrary code execution. These\nissues were addressed by updating PHP to version 5.4.22 on OS X\nMavericks v10.9, and 5.3.28 on OS X Lion and Mountain Lion. \nCVE-ID\nCVE-2013-4073\nCVE-2013-4113\nCVE-2013-4248\nCVE-2013-6420\n\nQuickLook\nAvailable for: OS X Mountain Lion v10.8.5\nImpact: Downloading a maliciously crafted Microsoft Office file may\nlead to an unexpected application termination or arbitrary code\nexecution\nDescription: A memory corruption issue existed in QuickLook\u0027s\nhandling of Microsoft Office files. Downloading a maliciously crafted\nMicrosoft Office file may have led to an unexpected application\ntermination or arbitrary code execution. This issue does not affect\nsystems running OS X Mavericks 10.9 or later. \nCVE-ID\nCVE-2014-1260 : Felix Groebert of the Google Security Team\n\nQuickLook\nAvailable for: OS X Mountain Lion v10.8.5,\nOS X Mavericks 10.9 and 10.9.1\nImpact: Downloading a maliciously crafted Microsoft Word document\nmay lead to an unexpected application termination or arbitrary code\nexecution\nDescription: A double free issue existed in QuickLook\u0027s handling of\nMicrosoft Word documents. This issue was addressed through improved\nmemory management. \nCVE-ID\nCVE-2014-1252 : Felix Groebert of the Google Security Team\n\nQuickTime\nAvailable for: OS X Lion v10.7.5, OS X Lion Server v10.7.5,\nOS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1\nImpact: Playing a maliciously crafted movie file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A buffer overflow existed in the handling of \u0027ftab\u0027\natoms. This issue was addressed through improved bounds checking. \nCVE-ID\nCVE-2014-1246 : An anonymous researcher working with HP\u0027s Zero Day\nInitiative\n\nQuickTime\nAvailable for: OS X Lion v10.7.5, OS X Lion Server v10.7.5,\nOS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1\nImpact: Playing a maliciously crafted movie file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A memory corruption issue existed in the handling of\n\u0027dref\u0027 atoms. This issue was addressed through improved bounds\nchecking. \nCVE-ID\nCVE-2014-1247 : Tom Gallagher \u0026 Paul Bates working with HP\u0027s Zero Day\nInitiative\n\nQuickTime\nAvailable for: OS X Lion v10.7.5, OS X Lion Server v10.7.5,\nOS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1\nImpact: Playing a maliciously crafted movie file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A buffer overflow existed in the handling of \u0027ldat\u0027\natoms. This issue was addressed through improved bounds checking. \nCVE-ID\nCVE-2014-1248 : Jason Kratzer working with iDefense VCP\n\nQuickTime\nAvailable for: OS X Lion v10.7.5, OS X Lion Server v10.7.5,\nOS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1\nImpact: Viewing a maliciously crafted PSD image may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A buffer overflow existed in the handling of PSD\nimages. This issue was addressed through improved bounds checking. \nCVE-ID\nCVE-2014-1249 : dragonltx of Tencent Security Team\n\nQuickTime\nAvailable for: OS X Lion v10.7.5, OS X Lion Server v10.7.5,\nOS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1\nImpact: Playing a maliciously crafted movie file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: An out of bounds byte swapping issue existed in the\nhandling of \u0027ttfo\u0027 elements. This issue was addressed through\nimproved bounds checking. \nCVE-ID\nCVE-2014-1250 : Jason Kratzer working with iDefense VCP\n\nQuickTime\nAvailable for: OS X Lion v10.7.5, OS X Lion Server v10.7.5,\nOS X Mountain Lion v10.8.5, OS X Mavericks 10.9 and 10.9.1\nImpact: Playing a maliciously crafted movie file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A signedness issue existed in the handling of \u0027stsz\u0027\natoms. This issue was addressed through improved bounds checking. \nCVE-ID\nCVE-2014-1245 : Tom Gallagher \u0026 Paul Bates working with HP\u0027s Zero Day\nInitiative\n\nSecure Transport\nAvailable for: OS X Mountain Lion v10.8.5\nImpact: An attacker may be able to decrypt data protected by SSL\nDescription: There were known attacks on the confidentiality of SSL\n3.0 and TLS 1.0 when a cipher suite used a block cipher in CBC mode. \nTo address these issues for applications using Secure Transport, the\n1-byte fragment mitigation was enabled by default for this\nconfiguration. \nCVE-ID\nCVE-2011-3389 : Juliano Rizzo and Thai Duong\n\nOS X Mavericks v10.9.2 includes the content of Safari 7.0.2. \n\nOS X Mavericks v10.9.2 and Security Update 2014-001 may be obtained from \nthe Mac App Store or Apple\u0027s Software Downloads web site:\nhttp://www.apple.com/support/downloads/\n\nInformation will also be posted to the Apple Security Updates\nweb site: http://support.apple.com/kb/HT1222\n\nThis message is signed with Apple\u0027s Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niQIcBAEBAgAGBQJTDNeoAAoJEPefwLHPlZEwaRAP/3i/2qRvNv6JqmE9p48uEyXn\nmlxwXpMyop+vrgMmuiSP14EGSv06HO04PNUtaWPxm7tVYXu0tMtjDcYdIu40TAy6\nU0T6QhRZC/uag1DCvdEOvqRUajKmmPtHTCJ6OsQGtGJHlEM+S5XgxRr7qgfkHMfb\nOlqFsgpdL/AAiYNfzItN2C+r2Lfwro6LDlxhikpASojlMFQrk8nJ6irRv617anSZ\n3DwJW2iJxNfpVrgqA1Nrx1fkrPmeT/8jgGuEP6RaKiWIbfXjRG5BW9WuarMqmaP8\nC6XoTaJaqEO9zb7F2uJR0HIYpJd065y/xiYNm91yDWIjdrO3wVgNVPGo1pHVyYsY\nY7lcyHUVJortKF8SHquw0j3Ujeugu8iWp6ND/00/4dGvwb0jzrxPUxkEmJ43130O\nt2Obtxdsaa+ub8cZHDN93WB3FQR5hd+KaeXLJC55q0qYY8o8zqdPqXAlYAP2gUQX\niB4Bs7NAh2CNJWNTtk2soTjZOwPvPLSPZ6I3w5i0HVP7HQl5K8chjihAwSeyezCZ\nq5gxCiK0lBW88AUd9n3L7ZOW2Rg53mh6+RiUL/VQ7TfidoP417VDKum300pZkgNv\nkBCklX9ya7QeLjOMnbnsTk32qG+TiDPgiGZ5IrK6C6T26dexJWbm8tuwPjy5r8mI\naiYIh+SzR0rBdMZRgyzv\n=+DAJ\n-----END PGP SIGNATURE-----\n. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201402-02\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: High\n Title: NVIDIA Drivers: Privilege Escalation\n Date: February 02, 2014\n Bugs: #493448\n ID: 201402-02\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nA NVIDIA drivers bug allows unprivileged user-mode software to access\nthe GPU inappropriately, allowing for privilege escalation. \n\nBackground\n==========\n\nThe NVIDIA drivers provide X11 and GLX support for NVIDIA graphic\nboards. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 x11-drivers/nvidia-drivers\n \u003c 331.20 *\u003e= 304.116\n *\u003e= 319.76\n \u003e= 331.20\n\nDescription\n===========\n\nThe vulnerability is caused due to the driver allowing unprivileged\nuser-mode software to access the GPU. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll NVIDIA Drivers users using the 331 branch should upgrade to the\nlatest version:\n\n # emerge --sync\n # emerge --ask --oneshot -v \"\u003e=x11-drivers/nvidia-drivers-331.20\"\n\nAll NVIDIA Drivers users using the 319 branch should upgrade to the\nlatest version:\n\n # emerge --sync\n # emerge --ask --oneshot -v \"\u003e=x11-drivers/nvidia-drivers-319.76\"\n\nAll NVIDIA Drivers users using the 304 branch should upgrade to the\nlatest version:\n\n # emerge --sync\n # emerge --ask --oneshot -v \"\u003e=x11-drivers/nvidia-drivers-304.116\"\n\nReferences\n==========\n\n[ 1 ] CVE-2013-5986\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5986\n[ 2 ] CVE-2013-5987\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5987\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201402-02.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2014 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n", "sources": [ { "db": "NVD", "id": "CVE-2013-5987" }, { "db": "JVNDB", "id": "JVNDB-2013-005889" }, { "db": "BID", "id": "64525" }, { "db": "VULHUB", "id": "VHN-65989" }, { "db": "PACKETSTORM", "id": "126718" }, { "db": "PACKETSTORM", "id": "126572" }, { "db": "PACKETSTORM", "id": "125427" }, { "db": "PACKETSTORM", "id": "125032" } ], "trust": 2.34 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-65989", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-65989" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2013-5987", "trust": 3.2 }, { "db": "BID", "id": "64525", "trust": 1.0 }, { "db": "JVN", "id": "JVNVU95868425", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2013-005889", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201312-572", "trust": 0.7 }, { "db": "SECUNIA", "id": "55904", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "126718", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "126572", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-65989", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "125427", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "125032", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-65989" }, { "db": "BID", "id": "64525" }, { "db": "JVNDB", "id": "JVNDB-2013-005889" }, { "db": "PACKETSTORM", "id": "126718" }, { "db": "PACKETSTORM", "id": "126572" }, { "db": "PACKETSTORM", "id": "125427" }, { "db": "PACKETSTORM", "id": "125032" }, { "db": "NVD", "id": "CVE-2013-5987" }, { "db": "CNNVD", "id": "CNNVD-201312-572" } ] }, "id": "VAR-201401-0137", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-65989" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:05:36.253000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "APPLE-SA-2014-02-25-1", "trust": 0.8, "url": "http://lists.apple.com/archives/security-announce/2014/feb/msg00000.html" }, { "title": "HT6150", "trust": 0.8, "url": "http://support.apple.com/kb/ht6150" }, { "title": "HT6150", "trust": 0.8, "url": "http://support.apple.com/kb/ht6150?viewlocale=ja_jp" }, { "title": "Unprivileged GPU access vulnerability - CVE-2013-5987", "trust": 0.8, "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/3377" }, { "title": "NVIDIA\u793e\u30c7\u30a3\u30b9\u30d7\u30ec\u30a4\u30c9\u30e9\u30a4\u30d0\u30fc\u306e\u8106\u5f31\u6027\u306b\u95a2\u3059\u308b\u304a\u77e5\u3089\u305b", "trust": 0.8, "url": "http://www.fmworld.net/biz/common/nvidia/20131218.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-005889" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2013-5987" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/3377" }, { "trust": 1.1, "url": "http://support.apple.com/kb/ht6150" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=139965942001604\u0026w=2" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-5987" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu95868425/" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-5987" }, { "trust": 0.6, "url": "http://secunia.com/advisories/55904" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/64525" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-5987" }, { "trust": 0.3, "url": "http://www.nvidia.com" }, { "trust": 0.2, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/" }, { "trust": 0.2, "url": "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins" }, { "trust": 0.2, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-5986" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=139965942001604\u0026amp;w=2" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-1255" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-6629" }, { "trust": 0.1, "url": "http://support.apple.com/kb/ht1222" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-5179" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-1250" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-1245" }, { "trust": 0.1, "url": "http://www.apple.com/support/downloads/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-1259" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-1254" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-1256" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-1258" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-1249" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-1248" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-6420" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-1247" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3389" }, { "trust": 0.1, "url": "https://www.apple.com/support/security/pgp/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-4073" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-5178" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-5139" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-1261" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-1896" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-1260" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-1246" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-1862" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-1257" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-4248" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-4113" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-1252" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5987" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "http://security.gentoo.org/glsa/glsa-201402-02.xml" }, { "trust": 0.1, "url": "http://security.gentoo.org/" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5986" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." } ], "sources": [ { "db": "VULHUB", "id": "VHN-65989" }, { "db": "BID", "id": "64525" }, { "db": "JVNDB", "id": "JVNDB-2013-005889" }, { "db": "PACKETSTORM", "id": "126718" }, { "db": "PACKETSTORM", "id": "126572" }, { "db": "PACKETSTORM", "id": "125427" }, { "db": "PACKETSTORM", "id": "125032" }, { "db": "NVD", "id": "CVE-2013-5987" }, { "db": "CNNVD", "id": "CNNVD-201312-572" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-65989" }, { "db": "BID", "id": "64525" }, { "db": "JVNDB", "id": "JVNDB-2013-005889" }, { "db": "PACKETSTORM", "id": "126718" }, { "db": "PACKETSTORM", "id": "126572" }, { "db": "PACKETSTORM", "id": "125427" }, { "db": "PACKETSTORM", "id": "125032" }, { "db": "NVD", "id": "CVE-2013-5987" }, { "db": "CNNVD", "id": "CNNVD-201312-572" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-01-21T00:00:00", "db": "VULHUB", "id": "VHN-65989" }, { "date": "2013-12-03T00:00:00", "db": "BID", "id": "64525" }, { "date": "2014-01-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-005889" }, { "date": "2014-05-20T00:00:29", "db": "PACKETSTORM", "id": "126718" }, { "date": "2014-05-09T23:14:58", "db": "PACKETSTORM", "id": "126572" }, { "date": "2014-02-26T22:21:07", "db": "PACKETSTORM", "id": "125427" }, { "date": "2014-02-03T23:09:16", "db": "PACKETSTORM", "id": "125032" }, { "date": "2014-01-21T18:55:09.710000", "db": "NVD", "id": "CVE-2013-5987" }, { "date": "2013-12-31T00:00:00", "db": "CNNVD", "id": "CNNVD-201312-572" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-08-23T00:00:00", "db": "VULHUB", "id": "VHN-65989" }, { "date": "2014-05-14T01:51:00", "db": "BID", "id": "64525" }, { "date": "2014-02-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-005889" }, { "date": "2016-08-23T15:15:33.347000", "db": "NVD", "id": "CVE-2013-5987" }, { "date": "2014-04-04T00:00:00", "db": "CNNVD", "id": "CNNVD-201312-572" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "64525" }, { "db": "CNNVD", "id": "CNNVD-201312-572" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "NVIDIA In graphics drivers GPU Vulnerability that can bypass access restrictions", "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-005889" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control", "sources": [ { "db": "CNNVD", "id": "CNNVD-201312-572" } ], "trust": 0.6 } }
var-201509-0277
Vulnerability from variot
The NVIDIA display driver R352 before 353.82 and R340 before 341.81 on Windows; R304 before 304.128, R340 before 340.93, and R352 before 352.41 on Linux; and R352 before 352.46 on GRID vGPU and vSGA allows local users to write to an arbitrary kernel memory location and consequently gain privileges via a crafted ioctl call. Multiple HP products are prone to a local privilege-escalation vulnerability and a local denial-of-service vulnerability. Local attackers can exploit these issues to gain elevated privileges or cause a denial-of-service condition. ============================================================================ Ubuntu Security Notice USN-2747-1 September 28, 2015
nvidia-graphics-drivers-304, nvidia-graphics-drivers-304-updates, nvidia-graphics-drivers-340, nvidia-graphics-drivers-340-updates, nvidia-graphics-drivers-346, nvidia-graphics-drivers-346-updates, jockey vulnerability ============================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 15.04
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
Summary:
NVIDIA graphics drivers could be made to run programs as an administrator.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 15.04: nvidia-304 304.128-0ubuntu0.1 nvidia-304-updates 304.128-0ubuntu0.1 nvidia-340 340.93-0ubuntu0.1 nvidia-340-updates 340.93-0ubuntu0.1 nvidia-346 346.96-0ubuntu0.1 nvidia-346-updates 346.96-0ubuntu0.1
Ubuntu 14.04 LTS: nvidia-304 304.128-0ubuntu0.0.1 nvidia-304-updates 304.128-0ubuntu0.0.1 nvidia-340 340.93-0ubuntu0.0.1 nvidia-340-updates 340.93-0ubuntu0.0.1 nvidia-346 346.96-0ubuntu0.0.1 nvidia-346-updates 346.96-0ubuntu0.0.1
Ubuntu 12.04 LTS: jockey-common 0.9.7-0ubuntu7.16 nvidia-304 304.128-0ubuntu0.0.0.1 nvidia-304-updates 304.128-0ubuntu0.0.0.1 nvidia-340 340.93-0ubuntu0.0.0.1 nvidia-340-updates 340.93-0ubuntu0.0.0.1
After a standard system update you need to reboot your computer to make all the necessary changes.
References: http://www.ubuntu.com/usn/usn-2747-1 CVE-2015-5950
Package Information:
https://launchpad.net/ubuntu/+source/nvidia-graphics-drivers-304/304.128-0ubuntu0.1
https://launchpad.net/ubuntu/+source/nvidia-graphics-drivers-304-updates/304.128-0ubuntu0.1 https://launchpad.net/ubuntu/+source/nvidia-graphics-drivers-340/340.93-0ubuntu0.1
https://launchpad.net/ubuntu/+source/nvidia-graphics-drivers-340-updates/340.93-0ubuntu0.1 https://launchpad.net/ubuntu/+source/nvidia-graphics-drivers-346/346.96-0ubuntu0.1
https://launchpad.net/ubuntu/+source/nvidia-graphics-drivers-346-updates/346.96-0ubuntu0.1
https://launchpad.net/ubuntu/+source/nvidia-graphics-drivers-304/304.128-0ubuntu0.0.1
https://launchpad.net/ubuntu/+source/nvidia-graphics-drivers-304-updates/304.128-0ubuntu0.0.1
https://launchpad.net/ubuntu/+source/nvidia-graphics-drivers-340/340.93-0ubuntu0.0.1
https://launchpad.net/ubuntu/+source/nvidia-graphics-drivers-340-updates/340.93-0ubuntu0.0.1
https://launchpad.net/ubuntu/+source/nvidia-graphics-drivers-346/346.96-0ubuntu0.0.1
https://launchpad.net/ubuntu/+source/nvidia-graphics-drivers-346-updates/346.96-0ubuntu0.0.1 https://launchpad.net/ubuntu/+source/jockey/0.9.7-0ubuntu7.16
https://launchpad.net/ubuntu/+source/nvidia-graphics-drivers-304/304.128-0ubuntu0.0.0.1
https://launchpad.net/ubuntu/+source/nvidia-graphics-drivers-304-updates/304.128-0ubuntu0.0.0.1
https://launchpad.net/ubuntu/+source/nvidia-graphics-drivers-340/340.93-0ubuntu0.0.0.1
https://launchpad.net/ubuntu/+source/nvidia-graphics-drivers-340-updates/340.93-0ubuntu0.0.0.1 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Note: the current version of the following document is available here: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04815468
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c04815468 Version: 1
HPSBHF03513 rev.1 - HP PCs and Workstations running Windows and Linux with NVidia Graphics Driver, Local Denial of Service (DoS), Elevation of Privilege
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.
Release Date: 2015-09-25 Last Updated: 2015-09-25
Potential Security Impact: Denial of Service (DoS), elevation of privilege
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY Potential security vulnerabilities have been identified with certain HP PCs and workstations with Windows and Linux running the NVidia Graphics Driver. The vulnerabilities could be locally exploited resulting in Denial of Service (DoS) and elevation of privilege.
Note: This issue is present on Windows and Linux operating systems and affects all currently supported NVIDIA driver releases and all GPUs. This issue does not affect Android based NVIDIA Tegra products.
References:
CVE-2015-5950 SSRT102235
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP Notebooks and Workstations
HP EliteBook 8740w 8740w Nvidia video driver HP EliteBook 8440w 8440w Nvidia video driver HP EliteBook 8540w 8540w Nvidia video driver HP EliteBook 8760w 8760w Nvidia video driver HP EliteBook 8560w 8560w Nvidia video driver HP EliteBook 8770w 8570w Nvidia video driver HP EliteBook 8570w 8570w Nvidia video driver HP ZBook 17 17 Nvidia video driver HP ZBook 15 15 Nvidia video driver HP Zbook 17 G2 17 G2 Nvidia video driver HP Zbook 15 G2 15 G2 Nvidia video driver HP Z1 Nvidia video driver HP Z230 Nvidia video driver HP Z420 Nvidia video driver HP Z440 Nvidia video driver HP Z620 Nvidia video driver HP Z640 Nvidia video driver HP Z820 Nvidia video driver HP Z840 Nvidia video driver
BACKGROUND
CVSS 2.0 Base Metrics
Reference Base Vector Base Score CVE-2015-5950 (AV:L/AC:M/Au:S/C:C/I:C/A:C) 6.6 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP has provided the following NVidia driver updates for the impacted Windows and Linux platforms running the NVidia Graphics Driver .
Note: This security bulletin will be revised as additional product updates become available.
Linux Users Note: Download and install Linux-specific graphics drivers directly from NVIDIA download resources to address vulnerability. - Long Lived Branch versions 352.41 (or greater) and 346.96 (or greater). - Legacy Support Branches 304.128 (or greater) and 340.93 (or greater).
To acquire the HP NVidia driver update, go to http://hp.com 1. Select "Support" and then "Download Drivers" 2. Enter your product name or number in the "Find my product" field. 3. Choose the product from the returned search 4. Choose the appropriate operating system 5. Under the Download Index, select Driver-Graphics, and download the updated NVidia driver version as listed in the table below. 6. Follow the installation instructions to install the NVidia Driver update.
| HP Notebooks and Workstations | O/S | Version | Softpaq | |-------------------------------|-----------------|---------|---------| | HP EliteBook 8440w | Windows 7/8/8.1 | 341.81 | SP72938 | | HP EliteBook 8540w | Windows 7/8/8.1 | 341.81 | SP72938 | | HP EliteBook 8560w | Windows 7/8/8.1 | 341.81 | SP72938 | | HP EliteBook 8570w | Windows 7/8/8.1 | 354.04 | SP72937 | | HP EliteBook 8570w | Windows 10 | 354.04 | SP72936 | | HP EliteBook 8740w | Windows 7/8/8.1 | 341.81 | SP72938 | | HP EliteBook 8760w | Windows 7/8/8.1 | 341.81 | SP72938 | | HP EliteBook 8770w | Windows 7/8/8.1 | 354.04 | SP72937 | | HP EliteBook 8770w | Windows 10 | 354.04 | SP72936 | | HP ZBook 15 | Windows 10 | 354.04 | SP72936 | | HP ZBook 15 | Windows 7/8/8.1 | 354.04 | SP72937 | | HP ZBook 15 G2 | Windows 7/8/8.1 | 354.04 | SP72937 | | HP ZBook 15 G2 | Windows 10 | 354.04 | SP72936 | | HP ZBook 17 | Windows 7/8/8.1 | 354.04 | SP72937 | | HP ZBook 17 | Windows 10 | 354.04 | SP72936 | | HP ZBook 17 G2 | Windows 7/8/8.1 | 354.04 | SP72937 | | HP ZBook 17 G2 | Windows 10 | 354.04 | SP72936 | | HP Z1 | See Note | | | | HP Z230 | See Note | | | | HP Z420 | See Note | | | | HP Z440 | See Note | | | | HP Z620 | See Note | | | | HP Z640 | See Note | | | | HP Z820 | See Note | | | | HP Z840 | See Note | | |
*Note: HP will revise this security bulletin when softpaq updates are available for these products. Until available, customers can download updated NVidia drivers for Windows 7, 8.1 or 10.0 from NVidia.com.
HISTORY Version:1 (rev.1) - 25 September 2015 Initial release
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.
3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX
Copyright 2015 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners.
-----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.19 (GNU/Linux)
iEYEARECAAYFAlYFpJsACgkQ4B86/C0qfVnWugCgi6SU1Yc5YsvliSb/imDb0N8V gfoAniAaSv9eeyapAzMPxUB//a9YGUHL =K/FB -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201509-0277", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "display driver", "scope": "eq", "trust": 1.6, "vendor": "nvidia", "version": "304.119" }, { "model": "display driver", "scope": "eq", "trust": 1.6, "vendor": "nvidia", "version": "340.43" }, { "model": "display driver", "scope": "eq", "trust": 1.6, "vendor": "nvidia", "version": "304.121" }, { "model": "display driver", "scope": "eq", "trust": 1.6, "vendor": "nvidia", "version": "340.52" }, { "model": "display driver", "scope": "eq", "trust": 1.6, "vendor": "nvidia", "version": "353.06" }, { "model": "display driver", "scope": "eq", "trust": 1.6, "vendor": "nvidia", "version": "341.44" }, { "model": "display driver", "scope": "eq", "trust": 1.6, "vendor": "nvidia", "version": "304.125" }, { "model": "display driver", "scope": "eq", "trust": 1.6, "vendor": "nvidia", "version": "304.123" }, { "model": "display driver", "scope": "lte", "trust": 1.0, "vendor": "nvidia", "version": "352.86" }, { "model": "gpu driver", "scope": "lte", "trust": 1.0, "vendor": "nvidia", "version": "352.30" }, { "model": "display driver", "scope": "lte", "trust": 1.0, "vendor": "nvidia", "version": "352.09" }, { "model": "display driver", "scope": "eq", "trust": 1.0, "vendor": "nvidia", "version": "352.21" }, { "model": "display driver", "scope": "eq", "trust": 1.0, "vendor": "nvidia", "version": "352.30" }, { "model": "display driver", "scope": "eq", "trust": 1.0, "vendor": "nvidia", "version": "304.108" }, { "model": "gpu display driver", "scope": "lt", "trust": 0.8, "vendor": "nvidia", "version": "r304 304.128 (linux)" }, { "model": "gpu display driver", "scope": "lt", "trust": 0.8, "vendor": "nvidia", "version": "r340 340.93 (linux)" }, { "model": "gpu display driver", "scope": "lt", "trust": 0.8, "vendor": "nvidia", "version": "r340 341.81 (windows)" }, { "model": "gpu display driver", "scope": "lt", "trust": 0.8, "vendor": "nvidia", "version": "r352 352.41 (linux)" }, { "model": "gpu display driver", "scope": "lt", "trust": 0.8, "vendor": "nvidia", "version": "r352 352.46 (nvidia grid vgpu/vsga)" }, { "model": "gpu display driver", "scope": "lt", "trust": 0.8, "vendor": "nvidia", "version": "r352 353.82 (windows)" }, { "model": "display driver", "scope": "eq", "trust": 0.6, "vendor": "nvidia", "version": "352.86" }, { "model": "gpu driver", "scope": "eq", "trust": 0.6, "vendor": "nvidia", "version": "352.30" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.04" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.04" } ], "sources": [ { "db": "BID", "id": "76854" }, { "db": "JVNDB", "id": "JVNDB-2015-005013" }, { "db": "NVD", "id": "CVE-2015-5950" }, { "db": "CNNVD", "id": "CNNVD-201509-590" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:nvidia:gpu_driver:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "352.30", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:nvidia:display_driver:304.125:*:*:*:*:linux:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nvidia:display_driver:*:*:*:*:*:linux:*:*", "cpe_name": [], "versionEndIncluding": "352.09", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nvidia:display_driver:304.119:*:*:*:*:linux:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nvidia:display_driver:304.108:*:*:*:*:linux:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nvidia:display_driver:352.30:*:*:*:*:linux:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nvidia:display_driver:352.21:*:*:*:*:linux:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nvidia:display_driver:304.123:*:*:*:*:linux:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nvidia:display_driver:304.121:*:*:*:*:linux:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:nvidia:display_driver:353.06:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nvidia:display_driver:341.44:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nvidia:display_driver:340.52:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nvidia:display_driver:340.43:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nvidia:display_driver:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "352.86", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2015-5950" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported this issue.", "sources": [ { "db": "BID", "id": "76854" } ], "trust": 0.3 }, "cve": "CVE-2015-5950", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.4, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 6.9, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2015-5950", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2015-5950", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201509-590", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2015-5950", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2015-5950" }, { "db": "JVNDB", "id": "JVNDB-2015-005013" }, { "db": "NVD", "id": "CVE-2015-5950" }, { "db": "CNNVD", "id": "CNNVD-201509-590" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The NVIDIA display driver R352 before 353.82 and R340 before 341.81 on Windows; R304 before 304.128, R340 before 340.93, and R352 before 352.41 on Linux; and R352 before 352.46 on GRID vGPU and vSGA allows local users to write to an arbitrary kernel memory location and consequently gain privileges via a crafted ioctl call. Multiple HP products are prone to a local privilege-escalation vulnerability and a local denial-of-service vulnerability. \nLocal attackers can exploit these issues to gain elevated privileges or cause a denial-of-service condition. ============================================================================\nUbuntu Security Notice USN-2747-1\nSeptember 28, 2015\n\nnvidia-graphics-drivers-304, nvidia-graphics-drivers-304-updates,\nnvidia-graphics-drivers-340, nvidia-graphics-drivers-340-updates,\nnvidia-graphics-drivers-346, nvidia-graphics-drivers-346-updates, jockey\nvulnerability\n============================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 15.04\n- Ubuntu 14.04 LTS\n- Ubuntu 12.04 LTS\n\nSummary:\n\nNVIDIA graphics drivers could be made to run programs as an administrator. \n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 15.04:\n nvidia-304 304.128-0ubuntu0.1\n nvidia-304-updates 304.128-0ubuntu0.1\n nvidia-340 340.93-0ubuntu0.1\n nvidia-340-updates 340.93-0ubuntu0.1\n nvidia-346 346.96-0ubuntu0.1\n nvidia-346-updates 346.96-0ubuntu0.1\n\nUbuntu 14.04 LTS:\n nvidia-304 304.128-0ubuntu0.0.1\n nvidia-304-updates 304.128-0ubuntu0.0.1\n nvidia-340 340.93-0ubuntu0.0.1\n nvidia-340-updates 340.93-0ubuntu0.0.1\n nvidia-346 346.96-0ubuntu0.0.1\n nvidia-346-updates 346.96-0ubuntu0.0.1\n\nUbuntu 12.04 LTS:\n jockey-common 0.9.7-0ubuntu7.16\n nvidia-304 304.128-0ubuntu0.0.0.1\n nvidia-304-updates 304.128-0ubuntu0.0.0.1\n nvidia-340 340.93-0ubuntu0.0.0.1\n nvidia-340-updates 340.93-0ubuntu0.0.0.1\n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes. \n\nReferences:\n http://www.ubuntu.com/usn/usn-2747-1\n CVE-2015-5950\n\nPackage Information:\n\nhttps://launchpad.net/ubuntu/+source/nvidia-graphics-drivers-304/304.128-0ubuntu0.1\n\nhttps://launchpad.net/ubuntu/+source/nvidia-graphics-drivers-304-updates/304.128-0ubuntu0.1\n https://launchpad.net/ubuntu/+source/nvidia-graphics-drivers-340/340.93-0ubuntu0.1\n\nhttps://launchpad.net/ubuntu/+source/nvidia-graphics-drivers-340-updates/340.93-0ubuntu0.1\n https://launchpad.net/ubuntu/+source/nvidia-graphics-drivers-346/346.96-0ubuntu0.1\n\nhttps://launchpad.net/ubuntu/+source/nvidia-graphics-drivers-346-updates/346.96-0ubuntu0.1\n\nhttps://launchpad.net/ubuntu/+source/nvidia-graphics-drivers-304/304.128-0ubuntu0.0.1\n\nhttps://launchpad.net/ubuntu/+source/nvidia-graphics-drivers-304-updates/304.128-0ubuntu0.0.1\n\nhttps://launchpad.net/ubuntu/+source/nvidia-graphics-drivers-340/340.93-0ubuntu0.0.1\n\nhttps://launchpad.net/ubuntu/+source/nvidia-graphics-drivers-340-updates/340.93-0ubuntu0.0.1\n\nhttps://launchpad.net/ubuntu/+source/nvidia-graphics-drivers-346/346.96-0ubuntu0.0.1\n\nhttps://launchpad.net/ubuntu/+source/nvidia-graphics-drivers-346-updates/346.96-0ubuntu0.0.1\n https://launchpad.net/ubuntu/+source/jockey/0.9.7-0ubuntu7.16\n\nhttps://launchpad.net/ubuntu/+source/nvidia-graphics-drivers-304/304.128-0ubuntu0.0.0.1\n\nhttps://launchpad.net/ubuntu/+source/nvidia-graphics-drivers-304-updates/304.128-0ubuntu0.0.0.1\n\nhttps://launchpad.net/ubuntu/+source/nvidia-graphics-drivers-340/340.93-0ubuntu0.0.0.1\n\nhttps://launchpad.net/ubuntu/+source/nvidia-graphics-drivers-340-updates/340.93-0ubuntu0.0.0.1\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nNote: the current version of the following document is available here:\nhttps://h20564.www2.hpe.com/portal/site/hpsc/public/kb/\ndocDisplay?docId=emr_na-c04815468\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: c04815468\nVersion: 1\n\nHPSBHF03513 rev.1 - HP PCs and Workstations running Windows and Linux with\nNVidia Graphics Driver, Local Denial of Service (DoS), Elevation of Privilege\n\nNOTICE: The information in this Security Bulletin should be acted upon as\nsoon as possible. \n\nRelease Date: 2015-09-25\nLast Updated: 2015-09-25\n\nPotential Security Impact: Denial of Service (DoS), elevation of privilege\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nPotential security vulnerabilities have been identified with certain HP PCs\nand workstations with Windows and Linux running the NVidia Graphics Driver. \nThe vulnerabilities could be locally exploited resulting in Denial of Service\n(DoS) and elevation of privilege. \n\nNote: This issue is present on Windows and Linux operating systems and\naffects all currently supported NVIDIA driver releases and all GPUs. This\nissue does not affect Android based NVIDIA Tegra products. \n\nReferences:\n\nCVE-2015-5950\nSSRT102235\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \nHP Notebooks and Workstations\n\nHP EliteBook 8740w 8740w Nvidia video driver\nHP EliteBook 8440w 8440w Nvidia video driver\nHP EliteBook 8540w 8540w Nvidia video driver\nHP EliteBook 8760w 8760w Nvidia video driver\nHP EliteBook 8560w 8560w Nvidia video driver\nHP EliteBook 8770w 8570w Nvidia video driver\nHP EliteBook 8570w 8570w Nvidia video driver\nHP ZBook 17 17 Nvidia video driver\nHP ZBook 15 15 Nvidia video driver\nHP Zbook 17 G2 17 G2 Nvidia video driver\nHP Zbook 15 G2 15 G2 Nvidia video driver\nHP Z1 Nvidia video driver\nHP Z230 Nvidia video driver\nHP Z420 Nvidia video driver\nHP Z440 Nvidia video driver\nHP Z620 Nvidia video driver\nHP Z640 Nvidia video driver\nHP Z820 Nvidia video driver\nHP Z840 Nvidia video driver\n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n Reference Base Vector Base Score\nCVE-2015-5950 (AV:L/AC:M/Au:S/C:C/I:C/A:C) 6.6\n===========================================================\n Information on CVSS is documented\n in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\n\nHP has provided the following NVidia driver updates for the impacted Windows\nand Linux platforms running the NVidia Graphics Driver . \n\nNote: This security bulletin will be revised as additional product updates\nbecome available. \n\nLinux Users Note: Download and install Linux-specific graphics drivers\ndirectly from NVIDIA download resources to address vulnerability. \n - Long Lived Branch versions 352.41 (or greater) and 346.96 (or greater). \n - Legacy Support Branches 304.128 (or greater) and 340.93 (or greater). \n\nTo acquire the HP NVidia driver update, go to http://hp.com\n 1. Select \"Support\" and then \"Download Drivers\"\n 2. Enter your product name or number in the \"Find my product\" field. \n 3. Choose the product from the returned search\n 4. Choose the appropriate operating system\n 5. Under the Download Index, select Driver-Graphics, and download the\nupdated NVidia driver version as listed in the table below. \n 6. Follow the installation instructions to install the NVidia Driver\nupdate. \n\n| HP Notebooks and Workstations | O/S | Version | Softpaq |\n|-------------------------------|-----------------|---------|---------|\n| HP EliteBook 8440w | Windows 7/8/8.1 | 341.81 | SP72938 |\n| HP EliteBook 8540w | Windows 7/8/8.1 | 341.81 | SP72938 |\n| HP EliteBook 8560w | Windows 7/8/8.1 | 341.81 | SP72938 |\n| HP EliteBook 8570w | Windows 7/8/8.1 | 354.04 | SP72937 |\n| HP EliteBook 8570w | Windows 10 | 354.04 | SP72936 |\n| HP EliteBook 8740w | Windows 7/8/8.1 | 341.81 | SP72938 |\n| HP EliteBook 8760w | Windows 7/8/8.1 | 341.81 | SP72938 |\n| HP EliteBook 8770w | Windows 7/8/8.1 | 354.04 | SP72937 |\n| HP EliteBook 8770w | Windows 10 | 354.04 | SP72936 |\n| HP ZBook 15 | Windows 10 | 354.04 | SP72936 |\n| HP ZBook 15 | Windows 7/8/8.1 | 354.04 | SP72937 |\n| HP ZBook 15 G2 | Windows 7/8/8.1 | 354.04 | SP72937 |\n| HP ZBook 15 G2 | Windows 10 | 354.04 | SP72936 |\n| HP ZBook 17 | Windows 7/8/8.1 | 354.04 | SP72937 |\n| HP ZBook 17 | Windows 10 | 354.04 | SP72936 |\n| HP ZBook 17 G2 | Windows 7/8/8.1 | 354.04 | SP72937 |\n| HP ZBook 17 G2 | Windows 10 | 354.04 | SP72936 |\n| HP Z1 | See *Note | | |\n| HP Z230 | See *Note | | |\n| HP Z420 | See *Note | | |\n| HP Z440 | See *Note | | |\n| HP Z620 | See *Note | | |\n| HP Z640 | See *Note | | |\n| HP Z820 | See *Note | | |\n| HP Z840 | See *Note | | |\n\n*Note: HP will revise this security bulletin when softpaq updates are\navailable for these products. Until available, customers can download updated\nNVidia drivers for Windows 7, 8.1 or 10.0 from NVidia.com. \n\nHISTORY\nVersion:1 (rev.1) - 25 September 2015 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer\u0027s patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HP Services support channel. For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com. \n\nReport: To report a potential security vulnerability with any HP supported\nproduct, send Email to: security-alert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin\nalerts via Email:\nhttp://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HP General Software\nHF = HP Hardware and Firmware\nMP = MPE/iX\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPI = Printing and Imaging\nPV = ProCurve\nST = Storage Software\nTU = Tru64 UNIX\nUX = HP-UX\n\nCopyright 2015 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. The information provided is provided \"as is\"\nwithout warranty of any kind. To the extent permitted by law, neither HP or\nits affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits; damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. \nHewlett-Packard Company and the names of Hewlett-Packard products referenced\nherein are trademarks of Hewlett-Packard Company in the United States and\nother countries. Other product and company names mentioned herein may be\ntrademarks of their respective owners. \n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v2.0.19 (GNU/Linux)\n\niEYEARECAAYFAlYFpJsACgkQ4B86/C0qfVnWugCgi6SU1Yc5YsvliSb/imDb0N8V\ngfoAniAaSv9eeyapAzMPxUB//a9YGUHL\n=K/FB\n-----END PGP SIGNATURE-----\n", "sources": [ { "db": "NVD", "id": "CVE-2015-5950" }, { "db": "JVNDB", "id": "JVNDB-2015-005013" }, { "db": "BID", "id": "76854" }, { "db": "VULMON", "id": "CVE-2015-5950" }, { "db": "PACKETSTORM", "id": "133740" }, { "db": "PACKETSTORM", "id": "133724" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-5950", "trust": 3.0 }, { "db": "SECTRACK", "id": "1033662", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2015-005013", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201509-590", "trust": 0.6 }, { "db": "BID", "id": "76854", "trust": 0.3 }, { "db": "VULMON", "id": "CVE-2015-5950", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "133740", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "133724", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2015-5950" }, { "db": "BID", "id": "76854" }, { "db": "JVNDB", "id": "JVNDB-2015-005013" }, { "db": "PACKETSTORM", "id": "133740" }, { "db": "PACKETSTORM", "id": "133724" }, { "db": "NVD", "id": "CVE-2015-5950" }, { "db": "CNNVD", "id": "CNNVD-201509-590" } ] }, "id": "VAR-201509-0277", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.33333334 }, "last_update_date": "2023-12-18T13:24:44.503000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HPSBHF03513", "trust": 0.8, "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04815468" }, { "title": "CVE-2015-5950 Memory corruption due to an unsanitized pointer in the NVIDIA display driver", "trust": 0.8, "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/3763/@/cve-2015-5950-memory-corruption-due-to-an-unsanitized-pointer-in-the-nvidia" }, { "title": "NVIDIA Display Driver Buffer Overflow Vulnerability Fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=57842" }, { "title": "Ubuntu Security Notice: nvidia-graphics-drivers-304, nvidia-graphics-drivers-304-updates, nvidia-graphics-drivers-340, nvidia-graphics-drivers-340-updates, nvidia-graphics-drivers-346, nvidia-graphics-drivers-346-updates, jockey vulnerability", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-2747-1" }, { "title": "Debian CVElist Bug Report Logs: nvidia-graphics-drivers: CVE-2015-5950 Memory corruption due to an unsanitized pointer in the NVIDIA display driver", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=9a28cf2e35df57592a8be6d72320424b" }, { "title": "HP: HPSBHF03513 rev.2 - HP PCs and Workstations running Windows and Linux with NVIDIA Graphics Driver, Local Denial of Service (DoS), Elevation of Privilege", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin\u0026qid=hpsbhf03513" }, { "title": "Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - April 2017", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins\u0026qid=a31bff03e9909229fd67996884614fdf" } ], "sources": [ { "db": "VULMON", "id": "CVE-2015-5950" }, { "db": "JVNDB", "id": "JVNDB-2015-005013" }, { "db": "CNNVD", "id": "CNNVD-201509-590" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-005013" }, { "db": "NVD", "id": "CVE-2015-5950" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/3763/~/cve-2015-5950-memory-corruption-due-to-an-unsanitized-pointer-in-the-nvidia" }, { "trust": 1.7, "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04815468" }, { "trust": 1.2, "url": "http://www.ubuntu.com/usn/usn-2747-1" }, { "trust": 1.1, "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04815468" }, { "trust": 1.1, "url": "https://support.lenovo.com/us/en/product_security/len_3313" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1033662" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-5950" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-5950" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-5950" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=41236" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/2747-1/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/nvidia-graphics-drivers-346-updates/346.96-0ubuntu0.0.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/nvidia-graphics-drivers-346/346.96-0ubuntu0.0.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/nvidia-graphics-drivers-340/340.93-0ubuntu0.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/nvidia-graphics-drivers-340-updates/340.93-0ubuntu0.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/nvidia-graphics-drivers-346/346.96-0ubuntu0.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/nvidia-graphics-drivers-304/304.128-0ubuntu0.0.0.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/nvidia-graphics-drivers-304-updates/304.128-0ubuntu0.0.0.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/nvidia-graphics-drivers-304/304.128-0ubuntu0.0.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/nvidia-graphics-drivers-340-updates/340.93-0ubuntu0.0.0.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/nvidia-graphics-drivers-346-updates/346.96-0ubuntu0.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/nvidia-graphics-drivers-340/340.93-0ubuntu0.0.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/nvidia-graphics-drivers-340/340.93-0ubuntu0.0.0.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/nvidia-graphics-drivers-304-updates/304.128-0ubuntu0.0.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/nvidia-graphics-drivers-304/304.128-0ubuntu0.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/nvidia-graphics-drivers-304-updates/304.128-0ubuntu0.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/jockey/0.9.7-0ubuntu7.16" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/nvidia-graphics-drivers-340-updates/340.93-0ubuntu0.0.1" }, { "trust": 0.1, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/" }, { "trust": 0.1, "url": "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins" }, { "trust": 0.1, "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/" }, { "trust": 0.1, "url": "http://hp.com" } ], "sources": [ { "db": "VULMON", "id": "CVE-2015-5950" }, { "db": "JVNDB", "id": "JVNDB-2015-005013" }, { "db": "PACKETSTORM", "id": "133740" }, { "db": "PACKETSTORM", "id": "133724" }, { "db": "NVD", "id": "CVE-2015-5950" }, { "db": "CNNVD", "id": "CNNVD-201509-590" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2015-5950" }, { "db": "BID", "id": "76854" }, { "db": "JVNDB", "id": "JVNDB-2015-005013" }, { "db": "PACKETSTORM", "id": "133740" }, { "db": "PACKETSTORM", "id": "133724" }, { "db": "NVD", "id": "CVE-2015-5950" }, { "db": "CNNVD", "id": "CNNVD-201509-590" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-09-30T00:00:00", "db": "VULMON", "id": "CVE-2015-5950" }, { "date": "2015-09-25T00:00:00", "db": "BID", "id": "76854" }, { "date": "2015-10-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-005013" }, { "date": "2015-09-28T20:26:46", "db": "PACKETSTORM", "id": "133740" }, { "date": "2015-09-28T17:03:02", "db": "PACKETSTORM", "id": "133724" }, { "date": "2015-09-30T01:59:17.333000", "db": "NVD", "id": "CVE-2015-5950" }, { "date": "2015-09-29T00:00:00", "db": "CNNVD", "id": "CNNVD-201509-590" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-12-08T00:00:00", "db": "VULMON", "id": "CVE-2015-5950" }, { "date": "2015-11-03T19:54:00", "db": "BID", "id": "76854" }, { "date": "2015-10-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-005013" }, { "date": "2016-12-08T03:11:34.937000", "db": "NVD", "id": "CVE-2015-5950" }, { "date": "2015-10-08T00:00:00", "db": "CNNVD", "id": "CNNVD-201509-590" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "76854" }, { "db": "PACKETSTORM", "id": "133740" }, { "db": "CNNVD", "id": "CNNVD-201509-590" } ], "trust": 1.0 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural OS And run on applications NVIDIA Vulnerability in display driver in arbitrary kernel memory area", "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-005013" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer overflow", "sources": [ { "db": "CNNVD", "id": "CNNVD-201509-590" } ], "trust": 0.6 } }
var-201611-0005
Vulnerability from variot
For the NVIDIA Quadro, NVS, and GeForce products, there is a Remote Desktop denial of service. A successful exploit of a vulnerable system will result in a kernel null pointer dereference, causing a blue screen crash. Supplementary information : CWE Vulnerability types by CWE-476: NULL Pointer Dereference (NULL Pointer dereferencing ) Has been identified. Multiple NVIDIA products are prone to a denial-of-service vulnerability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201611-0005", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "gpu driver", "scope": "gte", "trust": 1.0, "vendor": "nvidia", "version": "367" }, { "model": "gpu driver", "scope": "gte", "trust": 1.0, "vendor": "nvidia", "version": "340" }, { "model": "gpu driver", "scope": "lt", "trust": 1.0, "vendor": "nvidia", "version": "368.39" }, { "model": "gpu driver", "scope": "lt", "trust": 1.0, "vendor": "nvidia", "version": "354.99" }, { "model": "gpu driver", "scope": "lt", "trust": 1.0, "vendor": "nvidia", "version": "362.77" }, { "model": "gpu driver", "scope": "gte", "trust": 1.0, "vendor": "nvidia", "version": "361" }, { "model": "gpu driver", "scope": "gte", "trust": 1.0, "vendor": "nvidia", "version": "352.0" }, { "model": "gpu driver", "scope": "lt", "trust": 1.0, "vendor": "nvidia", "version": "341.96" }, { "model": "gpu display driver", "scope": "eq", "trust": 0.8, "vendor": "nvidia", "version": "(windows)" }, { "model": "gpu driver", "scope": "eq", "trust": 0.6, "vendor": "nvidia", "version": "354.74" }, { "model": "gpu driver", "scope": "eq", "trust": 0.6, "vendor": "nvidia", "version": "368.22" }, { "model": "gpu driver", "scope": "eq", "trust": 0.6, "vendor": "nvidia", "version": "362.00" }, { "model": "gpu driver", "scope": "eq", "trust": 0.6, "vendor": "nvidia", "version": "368.39" }, { "model": "gpu driver", "scope": "eq", "trust": 0.6, "vendor": "nvidia", "version": "341.95" }, { "model": "quadro r367", "scope": "eq", "trust": 0.3, "vendor": "nvidia", "version": "0" }, { "model": "quadro r361", "scope": "eq", "trust": 0.3, "vendor": "nvidia", "version": "0" }, { "model": "quadro r352", "scope": "eq", "trust": 0.3, "vendor": "nvidia", "version": "0" }, { "model": "quadro r340", "scope": "eq", "trust": 0.3, "vendor": "nvidia", "version": "0" }, { "model": "nvs r367", "scope": "eq", "trust": 0.3, "vendor": "nvidia", "version": "0" }, { "model": "nvs r361", "scope": "eq", "trust": 0.3, "vendor": "nvidia", "version": "0" }, { "model": "nvs r352", "scope": "eq", "trust": 0.3, "vendor": "nvidia", "version": "0" }, { "model": "nvs r340", "scope": "eq", "trust": 0.3, "vendor": "nvidia", "version": "0" }, { "model": "geforce r367", "scope": "eq", "trust": 0.3, "vendor": "nvidia", "version": "0" }, { "model": "geforce r340", "scope": "eq", "trust": 0.3, "vendor": "nvidia", "version": "0" }, { "model": "thinkstation", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "thinkserver", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "thinkpad", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "system", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "x0" }, { "model": "ideapad", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "desktop", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x0" }, { "model": "quadro r367", "scope": "ne", "trust": 0.3, "vendor": "nvidia", "version": "368.39" }, { "model": "quadro r361", "scope": "ne", "trust": 0.3, "vendor": "nvidia", "version": "362.77" }, { "model": "quadro r352", "scope": "ne", "trust": 0.3, "vendor": "nvidia", "version": "354.99" }, { "model": "quadro r340", "scope": "ne", "trust": 0.3, "vendor": "nvidia", "version": "341.96" }, { "model": "nvs r367", "scope": "ne", "trust": 0.3, "vendor": "nvidia", "version": "368.39" }, { "model": "nvs r361", "scope": "ne", "trust": 0.3, "vendor": "nvidia", "version": "362.77" }, { "model": "nvs r352", "scope": "ne", "trust": 0.3, "vendor": "nvidia", "version": "354.99" }, { "model": "nvs r340", "scope": "ne", "trust": 0.3, "vendor": "nvidia", "version": "341.96" }, { "model": "geforce r367", "scope": "ne", "trust": 0.3, "vendor": "nvidia", "version": "368.69" }, { "model": "geforce r340", "scope": "ne", "trust": 0.3, "vendor": "nvidia", "version": "341.96" } ], "sources": [ { "db": "BID", "id": "93256" }, { "db": "JVNDB", "id": "JVNDB-2016-005836" }, { "db": "NVD", "id": "CVE-2016-4959" }, { "db": "CNNVD", "id": "CNNVD-201610-121" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:nvidia:gpu_driver:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "368.39", "versionStartIncluding": "367", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nvidia:gpu_driver:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "362.77", "versionStartIncluding": "361", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nvidia:gpu_driver:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "354.99", "versionStartIncluding": "352.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nvidia:gpu_driver:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "341.96", "versionStartIncluding": "340", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:nvidia:geforce_920m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:geforce_gt_710:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:geforce_gtx_1050:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:nvs_310:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:nvs_510:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:quadro_m1000m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:quadro_m2000m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:quadro_m5500:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:quadro_m600m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:geforce_gtx_1070:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:geforce_gtx_1080:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:geforce_gtx_950m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:geforce_gtx_960m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:quadro_m4000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:quadro_m4000m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:quadro_m5000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:quadro_m5000m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:quadro_m500m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:geforce_930m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:geforce_930mx:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:geforce_940m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:geforce_940mx:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:geforce_945m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:nvs_810:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:quadro_k1200:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:quadro_k420:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:quadro_k620:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:quadro_p6000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:titan_x:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:geforce_910m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:geforce_920mx:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:geforce_gt_730:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:geforce_gtx_1060:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:geforce_gtx_965m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:nvs_315:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:quadro_m2000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:quadro_m3000m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:quadro_m6000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:quadro_p5000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2016-4959" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Tripwire VERT", "sources": [ { "db": "BID", "id": "93256" } ], "trust": 0.3 }, "cve": "CVE-2016-4959", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2016-4959", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2016-4959", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2016-4959", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201610-121", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-005836" }, { "db": "NVD", "id": "CVE-2016-4959" }, { "db": "CNNVD", "id": "CNNVD-201610-121" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "For the NVIDIA Quadro, NVS, and GeForce products, there is a Remote Desktop denial of service. A successful exploit of a vulnerable system will result in a kernel null pointer dereference, causing a blue screen crash. Supplementary information : CWE Vulnerability types by CWE-476: NULL Pointer Dereference (NULL Pointer dereferencing ) Has been identified. Multiple NVIDIA products are prone to a denial-of-service vulnerability", "sources": [ { "db": "NVD", "id": "CVE-2016-4959" }, { "db": "JVNDB", "id": "JVNDB-2016-005836" }, { "db": "BID", "id": "93256" } ], "trust": 1.89 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-4959", "trust": 2.7 }, { "db": "BID", "id": "93256", "trust": 1.9 }, { "db": "JVNDB", "id": "JVNDB-2016-005836", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201610-121", "trust": 0.6 } ], "sources": [ { "db": "BID", "id": "93256" }, { "db": "JVNDB", "id": "JVNDB-2016-005836" }, { "db": "NVD", "id": "CVE-2016-4959" }, { "db": "CNNVD", "id": "CNNVD-201610-121" } ] }, "id": "VAR-201611-0005", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.215972225 }, "last_update_date": "2023-12-18T13:14:27.184000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Security Bulletin: Multiple vulnerabilities affect Quadro, NVS, and GeForce Windows based systems", "trust": 0.8, "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4213" }, { "title": "NVIDIA Quadro , NVS and GeForce Remediation measures for denial of service vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=65290" }, { "title": "NVIDIA Quadro , NVS and GeForce Remediation measures for denial of service vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=65439" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-005836" }, { "db": "CNNVD", "id": "CNNVD-201610-121" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-476", "trust": 1.0 }, { "problemtype": "CWE-Other", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-005836" }, { "db": "NVD", "id": "CVE-2016-4959" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.9, "url": "https://support.lenovo.com/us/en/product_security/ps500070" }, { "trust": 1.6, "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4213" }, { "trust": 1.6, "url": "http://www.securityfocus.com/bid/93256" }, { "trust": 1.6, "url": "http://www.tripwire.com/state-of-security/vulnerability-management/warning-this-post-contains-graphic-nvidia-content/" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-4959" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-4959" }, { "trust": 0.3, "url": "http://www.nvidia.com" }, { "trust": 0.3, "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4213/~/security-bulletin%3a-multiple-vulnerabilities-affect-quadro,-nvs,-and-geforce" } ], "sources": [ { "db": "BID", "id": "93256" }, { "db": "JVNDB", "id": "JVNDB-2016-005836" }, { "db": "NVD", "id": "CVE-2016-4959" }, { "db": "CNNVD", "id": "CNNVD-201610-121" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "BID", "id": "93256" }, { "db": "JVNDB", "id": "JVNDB-2016-005836" }, { "db": "NVD", "id": "CVE-2016-4959" }, { "db": "CNNVD", "id": "CNNVD-201610-121" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-09-30T00:00:00", "db": "BID", "id": "93256" }, { "date": "2016-11-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-005836" }, { "date": "2016-11-08T20:59:01.397000", "db": "NVD", "id": "CVE-2016-4959" }, { "date": "2016-09-29T00:00:00", "db": "CNNVD", "id": "CNNVD-201610-121" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-10-03T00:03:00", "db": "BID", "id": "93256" }, { "date": "2016-11-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-005836" }, { "date": "2019-05-30T14:23:15.607000", "db": "NVD", "id": "CVE-2016-4959" }, { "date": "2019-05-31T00:00:00", "db": "CNNVD", "id": "CNNVD-201610-121" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201610-121" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural NVIDIA Denial of service in products (DoS) Vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-005836" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-201610-121" } ], "trust": 0.6 } }
var-201611-0008
Vulnerability from variot
For the NVIDIA Quadro, NVS, and GeForce products, improper sanitization of parameters in the NVAPI support layer causes a denial of service vulnerability (blue screen crash) within the NVIDIA Windows graphics drivers. Multiple NVIDIA products are prone to multiple local privilege-escalation vulnerabilities and multiple local denial-of-service vulnerabilities. Local attackers can exploit these issues to gain elevated privileges or cause a denial-of-service condition
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201611-0008", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "gpu driver", "scope": "gte", "trust": 1.0, "vendor": "nvidia", "version": "367" }, { "model": "gpu driver", "scope": "gte", "trust": 1.0, "vendor": "nvidia", "version": "340" }, { "model": "gpu driver", "scope": "lt", "trust": 1.0, "vendor": "nvidia", "version": "368.39" }, { "model": "gpu driver", "scope": "lt", "trust": 1.0, "vendor": "nvidia", "version": "354.99" }, { "model": "gpu driver", "scope": "lt", "trust": 1.0, "vendor": "nvidia", "version": "362.77" }, { "model": "gpu driver", "scope": "gte", "trust": 1.0, "vendor": "nvidia", "version": "361" }, { "model": "gpu driver", "scope": "gte", "trust": 1.0, "vendor": "nvidia", "version": "352.0" }, { "model": "gpu driver", "scope": "lt", "trust": 1.0, "vendor": "nvidia", "version": "341.96" }, { "model": "gpu display driver", "scope": "eq", "trust": 0.8, "vendor": "nvidia", "version": "(windows)" }, { "model": "gpu driver", "scope": "eq", "trust": 0.6, "vendor": "nvidia", "version": "354.74" }, { "model": "gpu driver", "scope": "eq", "trust": 0.6, "vendor": "nvidia", "version": "368.22" }, { "model": "gpu driver", "scope": "eq", "trust": 0.6, "vendor": "nvidia", "version": "362.00" }, { "model": "gpu driver", "scope": "eq", "trust": 0.6, "vendor": "nvidia", "version": "368.39" }, { "model": "gpu driver", "scope": "eq", "trust": 0.6, "vendor": "nvidia", "version": "341.95" }, { "model": "quadro r367", "scope": "eq", "trust": 0.3, "vendor": "nvidia", "version": "0" }, { "model": "quadro r361", "scope": "eq", "trust": 0.3, "vendor": "nvidia", "version": "0" }, { "model": "quadro r352", "scope": "eq", "trust": 0.3, "vendor": "nvidia", "version": "0" }, { "model": "quadro r340", "scope": "eq", "trust": 0.3, "vendor": "nvidia", "version": "0" }, { "model": "nvs r367", "scope": "eq", "trust": 0.3, "vendor": "nvidia", "version": "0" }, { "model": "nvs r361", "scope": "eq", "trust": 0.3, "vendor": "nvidia", "version": "0" }, { "model": "nvs r352", "scope": "eq", "trust": 0.3, "vendor": "nvidia", "version": "0" }, { "model": "nvs r340", "scope": "eq", "trust": 0.3, "vendor": "nvidia", "version": "0" }, { "model": "geforce r367", "scope": "eq", "trust": 0.3, "vendor": "nvidia", "version": "0" }, { "model": "geforce r340", "scope": "eq", "trust": 0.3, "vendor": "nvidia", "version": "0" }, { "model": "thinkstation", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "thinkserver", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "thinkpad", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "system", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "x0" }, { "model": "ideapad", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "desktop", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x0" }, { "model": "quadro r367", "scope": "ne", "trust": 0.3, "vendor": "nvidia", "version": "368.39" }, { "model": "quadro r361", "scope": "ne", "trust": 0.3, "vendor": "nvidia", "version": "362.77" }, { "model": "quadro r352", "scope": "ne", "trust": 0.3, "vendor": "nvidia", "version": "354.99" }, { "model": "quadro r340", "scope": "ne", "trust": 0.3, "vendor": "nvidia", "version": "341.96" }, { "model": "nvs r367", "scope": "ne", "trust": 0.3, "vendor": "nvidia", "version": "368.39" }, { "model": "nvs r361", "scope": "ne", "trust": 0.3, "vendor": "nvidia", "version": "362.77" }, { "model": "nvs r352", "scope": "ne", "trust": 0.3, "vendor": "nvidia", "version": "354.99" }, { "model": "nvs r340", "scope": "ne", "trust": 0.3, "vendor": "nvidia", "version": "341.96" }, { "model": "geforce r367", "scope": "ne", "trust": 0.3, "vendor": "nvidia", "version": "368.69" }, { "model": "geforce r340", "scope": "ne", "trust": 0.3, "vendor": "nvidia", "version": "341.96" } ], "sources": [ { "db": "BID", "id": "93251" }, { "db": "JVNDB", "id": "JVNDB-2016-005839" }, { "db": "NVD", "id": "CVE-2016-5025" }, { "db": "CNNVD", "id": "CNNVD-201610-125" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:nvidia:gpu_driver:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "368.39", "versionStartIncluding": "367", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nvidia:gpu_driver:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "362.77", "versionStartIncluding": "361", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nvidia:gpu_driver:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "354.99", "versionStartIncluding": "352.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nvidia:gpu_driver:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "341.96", "versionStartIncluding": "340", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:nvidia:geforce_910m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:geforce_920mx:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:geforce_945m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:geforce_gt_730:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:geforce_gtx_1060:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:geforce_gtx_965m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:nvs_315:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:quadro_m2000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:quadro_m3000m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:quadro_m500m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:quadro_m6000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:quadro_p5000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:geforce_gtx_1070:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:geforce_gtx_1080:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:geforce_gtx_950m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:geforce_gtx_960m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:quadro_m4000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:quadro_m4000m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:quadro_m5000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:quadro_m5000m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:geforce_930m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:geforce_930mx:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:geforce_940m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:geforce_940mx:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:nvs_810:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:quadro_k1200:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:quadro_k420:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:quadro_k620:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:quadro_p6000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:titan_x:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:geforce_920m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:geforce_gt_710:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:geforce_gtx_1050:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:nvs_310:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:nvs_510:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:quadro_m1000m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:quadro_m2000m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:quadro_m5500:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:nvidia:quadro_m600m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2016-5025" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Alin Ghica, Joseph Bialek of Microsoft Vulnerability Research and Daniel Cornel.", "sources": [ { "db": "BID", "id": "93251" } ], "trust": 0.3 }, "cve": "CVE-2016-5025", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 6.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 8.5, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 6.1, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2016-5025", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 1.8, "impactScore": 4.7, "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 6.6, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2016-5025", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2016-5025", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201610-125", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-005839" }, { "db": "NVD", "id": "CVE-2016-5025" }, { "db": "CNNVD", "id": "CNNVD-201610-125" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "For the NVIDIA Quadro, NVS, and GeForce products, improper sanitization of parameters in the NVAPI support layer causes a denial of service vulnerability (blue screen crash) within the NVIDIA Windows graphics drivers. Multiple NVIDIA products are prone to multiple local privilege-escalation vulnerabilities and multiple local denial-of-service vulnerabilities. \nLocal attackers can exploit these issues to gain elevated privileges or cause a denial-of-service condition", "sources": [ { "db": "NVD", "id": "CVE-2016-5025" }, { "db": "JVNDB", "id": "JVNDB-2016-005839" }, { "db": "BID", "id": "93251" } ], "trust": 1.89 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-5025", "trust": 2.7 }, { "db": "BID", "id": "93251", "trust": 1.9 }, { "db": "JVNDB", "id": "JVNDB-2016-005839", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201610-125", "trust": 0.6 } ], "sources": [ { "db": "BID", "id": "93251" }, { "db": "JVNDB", "id": "JVNDB-2016-005839" }, { "db": "NVD", "id": "CVE-2016-5025" }, { "db": "CNNVD", "id": "CNNVD-201610-125" } ] }, "id": "VAR-201611-0008", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.215972225 }, "last_update_date": "2023-12-18T12:05:17.504000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Security Bulletin: Multiple vulnerabilities affect Quadro, NVS, and GeForce Windows based systems", "trust": 0.8, "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4213" }, { "title": "NVIDIA Quadro , NVS and GeForce Remediation measures for denial of service vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=65443" }, { "title": "NVIDIA Quadro , NVS and GeForce Remediation measures for denial of service vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=65294" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-005839" }, { "db": "CNNVD", "id": "CNNVD-201610-125" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-005839" }, { "db": "NVD", "id": "CVE-2016-5025" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.9, "url": "https://support.lenovo.com/us/en/product_security/ps500070" }, { "trust": 1.6, "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4213" }, { "trust": 1.6, "url": "http://www.securityfocus.com/bid/93251" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-5025" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-5025" }, { "trust": 0.3, "url": "http://www.nvidia.com" }, { "trust": 0.3, "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4213/~/security-bulletin%3a-multiple-vulnerabilities-affect-quadro,-nvs,-and-geforce" } ], "sources": [ { "db": "BID", "id": "93251" }, { "db": "JVNDB", "id": "JVNDB-2016-005839" }, { "db": "NVD", "id": "CVE-2016-5025" }, { "db": "CNNVD", "id": "CNNVD-201610-125" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "BID", "id": "93251" }, { "db": "JVNDB", "id": "JVNDB-2016-005839" }, { "db": "NVD", "id": "CVE-2016-5025" }, { "db": "CNNVD", "id": "CNNVD-201610-125" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-08-11T00:00:00", "db": "BID", "id": "93251" }, { "date": "2016-11-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-005839" }, { "date": "2016-11-08T20:59:04.630000", "db": "NVD", "id": "CVE-2016-5025" }, { "date": "2016-09-29T00:00:00", "db": "CNNVD", "id": "CNNVD-201610-125" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-10-03T00:03:00", "db": "BID", "id": "93251" }, { "date": "2016-11-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-005839" }, { "date": "2019-05-30T14:30:14.440000", "db": "NVD", "id": "CVE-2016-5025" }, { "date": "2019-05-31T00:00:00", "db": "CNNVD", "id": "CNNVD-201610-125" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "93251" }, { "db": "CNNVD", "id": "CNNVD-201610-125" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural NVIDIA Product Windows GPU Service operation disruption in display drivers (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-005839" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201610-125" } ], "trust": 0.6 } }
var-202002-0061
Vulnerability from variot
A Memory Corruption Vulnerability exists in NVIDIA Graphics Drivers 29549 due to an unknown function in the file proc/driver/nvidia/registry. NVIDIA The graphics driver contains a vulnerability related to out-of-bounds writing.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202002-0061", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "display driver", "scope": "gte", "trust": 1.0, "vendor": "nvidia", "version": "295.49" }, { "model": "display driver", "scope": "lte", "trust": 1.0, "vendor": "nvidia", "version": "295.53" }, { "model": "gpu display driver", "scope": "eq", "trust": 0.8, "vendor": "nvidia", "version": "295.49" }, { "model": "display driver", "scope": "eq", "trust": 0.6, "vendor": "nvidia", "version": "295.53" }, { "model": "display driver", "scope": "eq", "trust": 0.6, "vendor": "nvidia", "version": "295.49" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-006626" }, { "db": "NVD", "id": "CVE-2012-0951" }, { "db": "CNNVD", "id": "CNNVD-202002-695" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:nvidia:display_driver:*:*:*:*:*:linux:*:*", "cpe_name": [], "versionEndIncluding": "295.53", "versionStartIncluding": "295.49", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2012-0951" } ] }, "cve": "CVE-2012-0951", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 4.6, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2012-006626", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2012-006626", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2012-0951", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "JVNDB-2012-006626", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202002-695", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-006626" }, { "db": "NVD", "id": "CVE-2012-0951" }, { "db": "CNNVD", "id": "CNNVD-202002-695" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A Memory Corruption Vulnerability exists in NVIDIA Graphics Drivers 29549 due to an unknown function in the file proc/driver/nvidia/registry. NVIDIA The graphics driver contains a vulnerability related to out-of-bounds writing.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state", "sources": [ { "db": "NVD", "id": "CVE-2012-0951" }, { "db": "JVNDB", "id": "JVNDB-2012-006626" } ], "trust": 1.62 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "VULDB", "id": "10060", "trust": 2.4 }, { "db": "NVD", "id": "CVE-2012-0951", "trust": 2.4 }, { "db": "JVNDB", "id": "JVNDB-2012-006626", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202002-695", "trust": 0.6 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-006626" }, { "db": "NVD", "id": "CVE-2012-0951" }, { "db": "CNNVD", "id": "CNNVD-202002-695" } ] }, "id": "VAR-202002-0061", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.33333334 }, "last_update_date": "2023-12-18T12:27:44.462000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "https://www.nvidia.com" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-006626" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-006626" }, { "db": "NVD", "id": "CVE-2012-0951" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "https://vuldb.com/?id.10060" }, { "trust": 1.6, "url": "http://people.canonical.com/~ubuntu-security/cve/2012/cve-2012-0951.html" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0951" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-0951" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-006626" }, { "db": "NVD", "id": "CVE-2012-0951" }, { "db": "CNNVD", "id": "CNNVD-202002-695" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "JVNDB", "id": "JVNDB-2012-006626" }, { "db": "NVD", "id": "CVE-2012-0951" }, { "db": "CNNVD", "id": "CNNVD-202002-695" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-03-04T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-006626" }, { "date": "2020-02-12T17:15:11.657000", "db": "NVD", "id": "CVE-2012-0951" }, { "date": "2020-02-12T00:00:00", "db": "CNNVD", "id": "CNNVD-202002-695" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-03-04T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-006626" }, { "date": "2020-02-19T21:37:38.157000", "db": "NVD", "id": "CVE-2012-0951" }, { "date": "2020-02-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202002-695" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202002-695" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "NVIDIA Out-of-bounds write vulnerability in graphics driver", "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-006626" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202002-695" } ], "trust": 0.6 } }
var-201503-0080
Vulnerability from variot
The NVIDIA Display Driver R304 before 309.08, R340 before 341.44, R343 before 345.20, and R346 before 347.52 does not properly validate local client impersonation levels when performing a "kernel administrator check," which allows local users to gain administrator privileges via unspecified API calls. NVIDIA Display Driver is a graphics driver for NVIDIA. A local attacker may exploit this issue to gain root privileges.
To acquire the NVidia driver update, go to hp.com
Select "Support" and then "Download Drivers" Enter your product name or number in the "Find my product" field. Follow the installation instructions to install the NVidia Driver update.
NVidia Driver Update HP Notebooks Version Softpaq
HP EliteBook 8530w Mobile Workstation 341.44 sp70759
HP EliteBook 8540p Notebook PC 341.44 sp70759
HP EliteBook 8530p Notebook PC 341.44 sp70759
HP EliteBook 8760w Mobile Workstation 341.44 sp70759
HP EliteBook 8770w Mobile Workstation 341.44 sp70759
HP EliteBook 8440p Notebook PC 341.44 sp70759
HP EliteBook 8440w Mobile Workstation 341.44 sp70759
HP EliteBook 8540w Mobile Workstation 341.44 sp70759
HP EliteBook 8560w Mobile Workstation 341.44 sp70759
HP EliteBook 8730w Mobile Workstation 341.44 sp70759
HP ZBook 15 G2 Mobile Workstation 341.44 sp70759
HP EliteBook 8740w Mobile Workstation 341.44 sp70759
HP ZBook 15 Mobile Workstation 341.44 sp70759
HP EliteBook 8570w Mobile Workstation 341.44 sp70759
HP ZBook 17 G2 Mobile Workstation 341.44 sp70759
HP ZBook 17 Mobile Workstation 341.44 sp70759
HP Workstations Version Softpaq
HP Z1 G2 Touch Workstation 347.52 sp70633
HP Z1 G2 Workstation 347.52 sp70633
HP Z210 CMT Workstation 341.44 sp70898
HP Z210 SFF Workstation 341.44 sp70898
HP Z220 CMT Workstation 347.52 sp70633
HP Z220 SFF Workstation 347.52 sp70633
HP Z230 SFF Workstation 347.52 sp70633
HP Z230 Tower Workstation 347.52 sp70633
HP Z400 Workstation 341.44 sp70898
HP Z420 Workstation 347.52 sp70633
HP Z440 Workstation 347.52 sp70633
HP Z600 Workstation 341.44 sp70898
HP Z620 Workstation 347.52 sp70633
HP Z640 Workstation 347.52 sp70633
HP Z800 Workstation 341.44 sp70898
HP Z820 Workstation 347.52 sp70633
HP Z840 Workstation 347.52 sp70633
HISTORY Version:1 (rev.1) - 30 May 2015 Initial release
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Note: the current version of the following document is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04579346
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c04579346 Version: 1
HPSBHF03272 rev.1 - HP Servers with NVidia GPU Computing Driver running Windows Server 2008, Elevation of Privilege
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.
Release Date: 2015-04-24 Last Updated: 2015-04-24
Potential Security Impact: Elevation of privileges
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY A potential security vulnerability has been identified with certain HP Servers with NVidia GPU Computing Driver running Windows Server 2008. This vulnerability could be exploited resulting in elevation of privilege.
References:
CVE-2015-1170 SSRT101950
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. See the RESOLUTION Section for a table of impacted HP Servers with NVidia GPU Computing Driver running Windows Server 2008.
Note: the server is impacted if running an NVidia Driver earlier than v3.21.19.
BACKGROUND
CVSS 2.0 Base Metrics
Reference Base Vector Base Score CVE-2015-1170 (AV:L/AC:M/Au:S/C:C/I:C/A:C) 6.6 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002
RESOLUTION HP has provided a driver update for the impacted platforms to resolve the vulnerability in HP Servers with NVidia GPU Computing Driver running Windows Server 2008.
HP has provided an updated NVidia firmware driver version that resolves the security vulnerability.
Go to support and drivers. Search for the server model and then choose the Windows operating system. Select either one of the following: "Driver GPU Computing (NVidia)" for NVidia Tesla Models Driver Graphics NVidia for NVidia Quadro Models
HP Server Model NVidia Accelerator type Driver Version
DL360 G7 Quadro 4000 v3.21.19 or later
SL390s G7 Tesla Models: M2050, M2070, M2070Q, M2075, M2090 v3.21.19 or later
DL160 Gen8 Quadro 4000 v3.21.19 or later
ML350p Gen8 Quadro 4000, Quadro 6000 v3.21.19 or later
DL360e Gen8 Quadro 4000, Quadro K4200 v3.21.19 or later
DL380e Gen8 Quadro 4000, Quadro 6000 v3.21.19 or later
DL380e Gen8 Quadro 4000, Quadro 6000 v3.21.19 or later
SL250s Gen8 Tesla Models: M2070Q, M2075, M2090, K10, K20, K20X v3.21.19 or later
SL270s Gen8 Tesla Models: M2070Q, M2075, M2090, K10, K20, K20X v3.21.19 or later
SL270s Gen8 SE Tesla Models: K10, K20, K20X v3.21.19 or later
HISTORY Version:1 (rev.1) - 24 April 2015 Initial release
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.
3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX
Copyright 2015 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners.
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.13 (GNU/Linux)
iEYEARECAAYFAlU6gz0ACgkQ4B86/C0qfVlSFwCg9iMcSmmkABtkCHOR1/+6bg9Z XGMAoLLU03G8rp3aVxO6KW9FWESqbHhG =Oo46 -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201503-0080", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "gpu driver r343", "scope": "lte", "trust": 1.0, "vendor": "nvidia", "version": "345.19" }, { "model": "gpu driver r304", "scope": "lte", "trust": 1.0, "vendor": "nvidia", "version": "309.07" }, { "model": "gpu driver r346", "scope": "lte", "trust": 1.0, "vendor": "nvidia", "version": "347.51" }, { "model": "gpu driver r340", "scope": "lte", "trust": 1.0, "vendor": "nvidia", "version": "341.43" }, { "model": "gpu display driver", "scope": "lt", "trust": 0.8, "vendor": "nvidia", "version": "r304 309.08" }, { "model": "gpu display driver", "scope": "lt", "trust": 0.8, "vendor": "nvidia", "version": "r340 341.44" }, { "model": "gpu display driver", "scope": "lt", "trust": 0.8, "vendor": "nvidia", "version": "r343 345.20" }, { "model": "gpu display driver", "scope": "lt", "trust": 0.8, "vendor": "nvidia", "version": "r346 347.52" }, { "model": "display driver r304", "scope": "eq", "trust": 0.6, "vendor": "nvidia", "version": "(\u003c309.08)" }, { "model": "display driver r340", "scope": "eq", "trust": 0.6, "vendor": "nvidia", "version": "(341.44)" }, { "model": "display driver", "scope": "eq", "trust": 0.6, "vendor": "nvidia", "version": "343(345.20)" }, { "model": "display driver r346", "scope": "eq", "trust": 0.6, "vendor": "nvidia", "version": "(347.52)" }, { "model": "gpu driver r340", "scope": "eq", "trust": 0.6, "vendor": "nvidia", "version": "341.43" }, { "model": "gpu driver r343", "scope": "eq", "trust": 0.6, "vendor": "nvidia", "version": "345.19" }, { "model": "gpu driver r346", "scope": "eq", "trust": 0.6, "vendor": "nvidia", "version": "347.51" }, { "model": "gpu driver r304", "scope": "eq", "trust": 0.6, "vendor": "nvidia", "version": "309.07" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-01633" }, { "db": "JVNDB", "id": "JVNDB-2015-001710" }, { "db": "NVD", "id": "CVE-2015-1170" }, { "db": "CNNVD", "id": "CNNVD-201503-124" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:nvidia:gpu_driver_r304:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "309.07", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nvidia:gpu_driver_r340:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "341.43", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nvidia:gpu_driver_r343:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "345.19", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nvidia:gpu_driver_r346:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "347.51", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2015-1170" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "James Forshaw from Project Zero, Google", "sources": [ { "db": "BID", "id": "73442" } ], "trust": 0.3 }, "cve": "CVE-2015-1170", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.2, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2015-1170", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CNVD-2015-01633", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2015-1170", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2015-01633", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201503-124", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-01633" }, { "db": "JVNDB", "id": "JVNDB-2015-001710" }, { "db": "NVD", "id": "CVE-2015-1170" }, { "db": "CNNVD", "id": "CNNVD-201503-124" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The NVIDIA Display Driver R304 before 309.08, R340 before 341.44, R343 before 345.20, and R346 before 347.52 does not properly validate local client impersonation levels when performing a \"kernel administrator check,\" which allows local users to gain administrator privileges via unspecified API calls. NVIDIA Display Driver is a graphics driver for NVIDIA. \nA local attacker may exploit this issue to gain root privileges. \n\nTo acquire the NVidia driver update, go to hp.com\n\nSelect \"Support\" and then \"Download Drivers\"\nEnter your product name or number in the \"Find my product\" field. Follow the installation\ninstructions to install the NVidia Driver update. \n\nNVidia Driver Update HP Notebooks\n Version\n Softpaq\n\nHP EliteBook 8530w Mobile Workstation\n 341.44\n sp70759\n\nHP EliteBook 8540p Notebook PC\n 341.44\n sp70759\n\nHP EliteBook 8530p Notebook PC\n 341.44\n sp70759\n\nHP EliteBook 8760w Mobile Workstation\n 341.44\n sp70759\n\nHP EliteBook 8770w Mobile Workstation\n 341.44\n sp70759\n\nHP EliteBook 8440p Notebook PC\n 341.44\n sp70759\n\nHP EliteBook 8440w Mobile Workstation\n 341.44\n sp70759\n\nHP EliteBook 8540w Mobile Workstation\n 341.44\n sp70759\n\nHP EliteBook 8560w Mobile Workstation\n 341.44\n sp70759\n\nHP EliteBook 8730w Mobile Workstation\n 341.44\n sp70759\n\nHP ZBook 15 G2 Mobile Workstation\n 341.44\n sp70759\n\nHP EliteBook 8740w Mobile Workstation\n 341.44\n sp70759\n\nHP ZBook 15 Mobile Workstation\n 341.44\n sp70759\n\nHP EliteBook 8570w Mobile Workstation\n 341.44\n sp70759\n\nHP ZBook 17 G2 Mobile Workstation\n 341.44\n sp70759\n\nHP ZBook 17 Mobile Workstation\n 341.44\n sp70759\n\nHP Workstations\n Version\n Softpaq\n\nHP Z1 G2 Touch Workstation\n 347.52\n sp70633\n\nHP Z1 G2 Workstation\n 347.52\n sp70633\n\nHP Z210 CMT Workstation\n 341.44\n sp70898\n\nHP Z210 SFF Workstation\n 341.44\n sp70898\n\nHP Z220 CMT Workstation\n 347.52\n sp70633\n\nHP Z220 SFF Workstation\n 347.52\n sp70633\n\nHP Z230 SFF Workstation\n 347.52\n sp70633\n\nHP Z230 Tower Workstation\n 347.52\n sp70633\n\nHP Z400 Workstation\n 341.44\n sp70898\n\nHP Z420 Workstation\n 347.52\n sp70633\n\nHP Z440 Workstation\n 347.52\n sp70633\n\nHP Z600 Workstation\n 341.44\n sp70898\n\nHP Z620 Workstation\n 347.52\n sp70633\n\nHP Z640 Workstation\n 347.52\n sp70633\n\nHP Z800 Workstation\n 341.44\n sp70898\n\nHP Z820 Workstation\n 347.52\n sp70633\n\nHP Z840 Workstation\n 347.52\n sp70633\n\nHISTORY\nVersion:1 (rev.1) - 30 May 2015 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer\u0027s patch management policy. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nNote: the current version of the following document is available here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/\ndocDisplay?docId=emr_na-c04579346\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: c04579346\nVersion: 1\n\nHPSBHF03272 rev.1 - HP Servers with NVidia GPU Computing Driver running\nWindows Server 2008, Elevation of Privilege\n\nNOTICE: The information in this Security Bulletin should be acted upon as\nsoon as possible. \n\nRelease Date: 2015-04-24\nLast Updated: 2015-04-24\n\nPotential Security Impact: Elevation of privileges\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nA potential security vulnerability has been identified with certain HP\nServers with NVidia GPU Computing Driver running Windows Server 2008. This\nvulnerability could be exploited resulting in elevation of privilege. \n\nReferences:\n\nCVE-2015-1170\nSSRT101950\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \nSee the RESOLUTION\n Section for a table of impacted HP Servers with NVidia GPU Computing Driver\nrunning Windows Server 2008. \n\nNote: the server is impacted if running an NVidia Driver earlier than\nv3.21.19. \n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n Reference Base Vector Base Score\nCVE-2015-1170 (AV:L/AC:M/Au:S/C:C/I:C/A:C) 6.6\n===========================================================\n Information on CVSS is documented\n in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\nHP has provided a driver update for the impacted platforms to resolve the\nvulnerability in HP Servers with NVidia GPU Computing Driver running Windows\nServer 2008. \n\nHP has provided an updated NVidia firmware driver version that resolves the\nsecurity vulnerability. \n\nGo to support and drivers. \nSearch for the server model and then choose the Windows operating system. \nSelect either one of the following:\n\"Driver GPU Computing (NVidia)\" for NVidia Tesla Models\nDriver Graphics NVidia for NVidia Quadro Models\n\nHP Server Model\n NVidia Accelerator type\n Driver Version\n\nDL360 G7\n Quadro 4000\n v3.21.19 or later\n\nSL390s G7\n Tesla Models: M2050, M2070, M2070Q, M2075, M2090\n v3.21.19 or later\n\nDL160 Gen8\n Quadro 4000\n v3.21.19 or later\n\nML350p Gen8\n Quadro 4000, Quadro 6000\n v3.21.19 or later\n\nDL360e Gen8\n Quadro 4000, Quadro K4200\n v3.21.19 or later\n\nDL380e Gen8\n Quadro 4000, Quadro 6000\n v3.21.19 or later\n\nDL380e Gen8\n Quadro 4000, Quadro 6000\n v3.21.19 or later\n\nSL250s Gen8\n Tesla Models: M2070Q, M2075, M2090, K10, K20, K20X\n v3.21.19 or later\n\nSL270s Gen8\n Tesla Models: M2070Q, M2075, M2090, K10, K20, K20X\n v3.21.19 or later\n\nSL270s Gen8 SE\n Tesla Models: K10, K20, K20X\n v3.21.19 or later\n\nHISTORY\nVersion:1 (rev.1) - 24 April 2015 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer\u0027s patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HP Services support channel. For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com. \n\nReport: To report a potential security vulnerability with any HP supported\nproduct, send Email to: security-alert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin\nalerts via Email:\nhttp://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HP General Software\nHF = HP Hardware and Firmware\nMP = MPE/iX\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPI = Printing and Imaging\nPV = ProCurve\nST = Storage Software\nTU = Tru64 UNIX\nUX = HP-UX\n\nCopyright 2015 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. The information provided is provided \"as is\"\nwithout warranty of any kind. To the extent permitted by law, neither HP or\nits affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits; damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. \nHewlett-Packard Company and the names of Hewlett-Packard products referenced\nherein are trademarks of Hewlett-Packard Company in the United States and\nother countries. Other product and company names mentioned herein may be\ntrademarks of their respective owners. \n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.13 (GNU/Linux)\n\niEYEARECAAYFAlU6gz0ACgkQ4B86/C0qfVlSFwCg9iMcSmmkABtkCHOR1/+6bg9Z\nXGMAoLLU03G8rp3aVxO6KW9FWESqbHhG\n=Oo46\n-----END PGP SIGNATURE-----\n", "sources": [ { "db": "NVD", "id": "CVE-2015-1170" }, { "db": "JVNDB", "id": "JVNDB-2015-001710" }, { "db": "CNVD", "id": "CNVD-2015-01633" }, { "db": "BID", "id": "73442" }, { "db": "PACKETSTORM", "id": "131216" }, { "db": "PACKETSTORM", "id": "131625" } ], "trust": 2.61 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-1170", "trust": 3.5 }, { "db": "SECTRACK", "id": "1032013", "trust": 1.0 }, { "db": "JVNDB", "id": "JVNDB-2015-001710", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2015-01633", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201503-124", "trust": 0.6 }, { "db": "BID", "id": "73442", "trust": 0.3 }, { "db": "PACKETSTORM", "id": "131216", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "131625", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-01633" }, { "db": "BID", "id": "73442" }, { "db": "JVNDB", "id": "JVNDB-2015-001710" }, { "db": "PACKETSTORM", "id": "131216" }, { "db": "PACKETSTORM", "id": "131625" }, { "db": "NVD", "id": "CVE-2015-1170" }, { "db": "CNNVD", "id": "CNNVD-201503-124" } ] }, "id": "VAR-201503-0080", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2015-01633" } ], "trust": 1.433333335 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-01633" } ] }, "last_update_date": "2023-12-18T14:06:05.096000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HPSBHF03271", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en\u0026cc=us\u0026objectid=c04577892" }, { "title": "CVE-2015-1170: Windows Privilege Impersonation Check", "trust": 0.8, "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/3634" }, { "title": "NVIDIA Display Driver R304 Patch for Enhancing Privilege Vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/56175" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-01633" }, { "db": "JVNDB", "id": "JVNDB-2015-001710" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-264", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-001710" }, { "db": "NVD", "id": "CVE-2015-1170" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/3634" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=142781493222653\u0026w=2" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=143013598825091\u0026w=2" }, { "trust": 1.0, "url": "http://www.securitytracker.com/id/1032013" }, { "trust": 1.0, "url": "https://support.lenovo.com/product_security/nvidia_windows_privilege" }, { "trust": 1.0, "url": "https://support.lenovo.com/us/en/product_security/nvidia_windows_privilege" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1170" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-1170" }, { "trust": 0.3, "url": "http://www.nvidia.com" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1170" }, { "trust": 0.2, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/" }, { "trust": 0.2, "url": "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins" }, { "trust": 0.2, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/" }, { "trust": 0.1, "url": "http://www.hp.com" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-01633" }, { "db": "BID", "id": "73442" }, { "db": "JVNDB", "id": "JVNDB-2015-001710" }, { "db": "PACKETSTORM", "id": "131216" }, { "db": "PACKETSTORM", "id": "131625" }, { "db": "NVD", "id": "CVE-2015-1170" }, { "db": "CNNVD", "id": "CNNVD-201503-124" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2015-01633" }, { "db": "BID", "id": "73442" }, { "db": "JVNDB", "id": "JVNDB-2015-001710" }, { "db": "PACKETSTORM", "id": "131216" }, { "db": "PACKETSTORM", "id": "131625" }, { "db": "NVD", "id": "CVE-2015-1170" }, { "db": "CNNVD", "id": "CNNVD-201503-124" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-03-13T00:00:00", "db": "CNVD", "id": "CNVD-2015-01633" }, { "date": "2015-03-06T00:00:00", "db": "BID", "id": "73442" }, { "date": "2015-03-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-001710" }, { "date": "2015-03-31T15:57:44", "db": "PACKETSTORM", "id": "131216" }, { "date": "2015-04-24T23:45:00", "db": "PACKETSTORM", "id": "131625" }, { "date": "2015-03-06T23:59:02.263000", "db": "NVD", "id": "CVE-2015-1170" }, { "date": "2015-03-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201503-124" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-03-13T00:00:00", "db": "CNVD", "id": "CNVD-2015-01633" }, { "date": "2015-07-15T00:13:00", "db": "BID", "id": "73442" }, { "date": "2015-04-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-001710" }, { "date": "2016-12-08T03:07:22.887000", "db": "NVD", "id": "CVE-2015-1170" }, { "date": "2015-03-11T00:00:00", "db": "CNNVD", "id": "CNNVD-201503-124" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "73442" }, { "db": "PACKETSTORM", "id": "131216" }, { "db": "CNNVD", "id": "CNNVD-201503-124" } ], "trust": 1.0 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "NVIDIA GPU Vulnerability of obtaining administrator privileges in display driver", "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-001710" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control", "sources": [ { "db": "CNNVD", "id": "CNNVD-201503-124" } ], "trust": 0.6 } }
cve-2019-5686
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://nvidia.custhelp.com/app/answers/detail/a_id/4841 | x_refsource_CONFIRM | |
https://support.lenovo.com/us/en/product_security/LEN-28096 | x_refsource_CONFIRM |
Vendor | Product | Version | |
---|---|---|---|
▼ | NVIDIA | GPU Display Driver |
Version: All |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:01:52.069Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/4841" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.lenovo.com/us/en/product_security/LEN-28096" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "GPU Display Driver", "vendor": "NVIDIA", "versions": [ { "status": "affected", "version": "All" } ] } ], "descriptions": [ { "lang": "en", "value": "NVIDIA Windows GPU Display Driver (all versions) contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape in which the software uses an API function or data structure in a way that relies on properties that are not always guaranteed to be valid, which may lead to denial of service." } ], "problemTypes": [ { "descriptions": [ { "description": "denial of service, code execution", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-08T18:06:06", "orgId": "9576f279-3576-44b5-a4af-b9a8644b2de6", "shortName": "nvidia" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/4841" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.lenovo.com/us/en/product_security/LEN-28096" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@nvidia.com", "ID": "CVE-2019-5686", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "GPU Display Driver", "version": { "version_data": [ { "version_value": "All" } ] } } ] }, "vendor_name": "NVIDIA" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "NVIDIA Windows GPU Display Driver (all versions) contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape in which the software uses an API function or data structure in a way that relies on properties that are not always guaranteed to be valid, which may lead to denial of service." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "denial of service, code execution" } ] } ] }, "references": { "reference_data": [ { "name": "https://nvidia.custhelp.com/app/answers/detail/a_id/4841", "refsource": "CONFIRM", "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/4841" }, { "name": "https://support.lenovo.com/us/en/product_security/LEN-28096", "refsource": "CONFIRM", "url": "https://support.lenovo.com/us/en/product_security/LEN-28096" } ] } } } }, "cveMetadata": { "assignerOrgId": "9576f279-3576-44b5-a4af-b9a8644b2de6", "assignerShortName": "nvidia", "cveId": "CVE-2019-5686", "datePublished": "2019-08-06T19:48:58", "dateReserved": "2019-01-07T00:00:00", "dateUpdated": "2024-08-04T20:01:52.069Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-5683
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://nvidia.custhelp.com/app/answers/detail/a_id/4841 | x_refsource_CONFIRM | |
https://support.lenovo.com/us/en/product_security/LEN-28096 | x_refsource_CONFIRM |
Vendor | Product | Version | |
---|---|---|---|
▼ | NVIDIA | GPU Display Driver |
Version: All |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:01:52.202Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/4841" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.lenovo.com/us/en/product_security/LEN-28096" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "GPU Display Driver", "vendor": "NVIDIA", "versions": [ { "status": "affected", "version": "All" } ] } ], "descriptions": [ { "lang": "en", "value": "NVIDIA Windows GPU Display Driver (all versions) contains a vulnerability in the user mode video driver trace logger component. When an attacker has access to the system and creates a hard link, the software does not check for hard link attacks. This behavior may lead to code execution, denial of service, or escalation of privileges." } ], "problemTypes": [ { "descriptions": [ { "description": "denial of service, escalation of privileges, or code execution", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-08T18:06:06", "orgId": "9576f279-3576-44b5-a4af-b9a8644b2de6", "shortName": "nvidia" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/4841" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.lenovo.com/us/en/product_security/LEN-28096" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@nvidia.com", "ID": "CVE-2019-5683", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "GPU Display Driver", "version": { "version_data": [ { "version_value": "All" } ] } } ] }, "vendor_name": "NVIDIA" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "NVIDIA Windows GPU Display Driver (all versions) contains a vulnerability in the user mode video driver trace logger component. When an attacker has access to the system and creates a hard link, the software does not check for hard link attacks. This behavior may lead to code execution, denial of service, or escalation of privileges." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "denial of service, escalation of privileges, or code execution" } ] } ] }, "references": { "reference_data": [ { "name": "https://nvidia.custhelp.com/app/answers/detail/a_id/4841", "refsource": "CONFIRM", "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/4841" }, { "name": "https://support.lenovo.com/us/en/product_security/LEN-28096", "refsource": "CONFIRM", "url": "https://support.lenovo.com/us/en/product_security/LEN-28096" } ] } } } }, "cveMetadata": { "assignerOrgId": "9576f279-3576-44b5-a4af-b9a8644b2de6", "assignerShortName": "nvidia", "cveId": "CVE-2019-5683", "datePublished": "2019-08-06T19:48:16", "dateReserved": "2019-01-07T00:00:00", "dateUpdated": "2024-08-04T20:01:52.202Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-5685
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://nvidia.custhelp.com/app/answers/detail/a_id/4841 | x_refsource_CONFIRM | |
https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0812 | x_refsource_MISC | |
https://support.lenovo.com/us/en/product_security/LEN-28096 | x_refsource_CONFIRM |
Vendor | Product | Version | |
---|---|---|---|
▼ | NVIDIA | GPU Display Driver |
Version: All |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:01:52.284Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/4841" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0812" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.lenovo.com/us/en/product_security/LEN-28096" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "GPU Display Driver", "vendor": "NVIDIA", "versions": [ { "status": "affected", "version": "All" } ] } ], "descriptions": [ { "lang": "en", "value": "NVIDIA Windows GPU Display Driver (all versions) contains a vulnerability in DirectX drivers, in which a specially crafted shader can cause an out of bounds access to a shader local temporary array, which may lead to denial of service or code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "denial of service, code execution", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-08T18:06:06", "orgId": "9576f279-3576-44b5-a4af-b9a8644b2de6", "shortName": "nvidia" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/4841" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0812" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.lenovo.com/us/en/product_security/LEN-28096" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@nvidia.com", "ID": "CVE-2019-5685", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "GPU Display Driver", "version": { "version_data": [ { "version_value": "All" } ] } } ] }, "vendor_name": "NVIDIA" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "NVIDIA Windows GPU Display Driver (all versions) contains a vulnerability in DirectX drivers, in which a specially crafted shader can cause an out of bounds access to a shader local temporary array, which may lead to denial of service or code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "denial of service, code execution" } ] } ] }, "references": { "reference_data": [ { "name": "https://nvidia.custhelp.com/app/answers/detail/a_id/4841", "refsource": "CONFIRM", "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/4841" }, { "name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0812", "refsource": "MISC", "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0812" }, { "name": "https://support.lenovo.com/us/en/product_security/LEN-28096", "refsource": "CONFIRM", "url": "https://support.lenovo.com/us/en/product_security/LEN-28096" } ] } } } }, "cveMetadata": { "assignerOrgId": "9576f279-3576-44b5-a4af-b9a8644b2de6", "assignerShortName": "nvidia", "cveId": "CVE-2019-5685", "datePublished": "2019-08-06T19:48:40", "dateReserved": "2019-01-07T00:00:00", "dateUpdated": "2024-08-04T20:01:52.284Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-5687
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://nvidia.custhelp.com/app/answers/detail/a_id/4841 | x_refsource_CONFIRM | |
https://support.lenovo.com/us/en/product_security/LEN-28096 | x_refsource_CONFIRM |
Vendor | Product | Version | |
---|---|---|---|
▼ | NVIDIA | GPU Display Driver |
Version: All |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:01:52.282Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/4841" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.lenovo.com/us/en/product_security/LEN-28096" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "GPU Display Driver", "vendor": "NVIDIA", "versions": [ { "status": "affected", "version": "All" } ] } ], "descriptions": [ { "lang": "en", "value": "NVIDIA Windows GPU Display Driver (all versions) contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape in which an incorrect use of default permissions for an object exposes it to an unintended actor" } ], "problemTypes": [ { "descriptions": [ { "description": "denial of service, code execution", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-08T18:06:06", "orgId": "9576f279-3576-44b5-a4af-b9a8644b2de6", "shortName": "nvidia" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/4841" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.lenovo.com/us/en/product_security/LEN-28096" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@nvidia.com", "ID": "CVE-2019-5687", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "GPU Display Driver", "version": { "version_data": [ { "version_value": "All" } ] } } ] }, "vendor_name": "NVIDIA" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "NVIDIA Windows GPU Display Driver (all versions) contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape in which an incorrect use of default permissions for an object exposes it to an unintended actor" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "denial of service, code execution" } ] } ] }, "references": { "reference_data": [ { "name": "https://nvidia.custhelp.com/app/answers/detail/a_id/4841", "refsource": "CONFIRM", "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/4841" }, { "name": "https://support.lenovo.com/us/en/product_security/LEN-28096", "refsource": "CONFIRM", "url": "https://support.lenovo.com/us/en/product_security/LEN-28096" } ] } } } }, "cveMetadata": { "assignerOrgId": "9576f279-3576-44b5-a4af-b9a8644b2de6", "assignerShortName": "nvidia", "cveId": "CVE-2019-5687", "datePublished": "2019-08-06T19:49:03", "dateReserved": "2019-01-07T00:00:00", "dateUpdated": "2024-08-04T20:01:52.282Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-5684
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://nvidia.custhelp.com/app/answers/detail/a_id/4841 | x_refsource_CONFIRM | |
http://www.vmware.com/security/advisories/VMSA-2019-0012.html | x_refsource_CONFIRM | |
https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0779 | x_refsource_MISC | |
https://support.lenovo.com/us/en/product_security/LEN-28096 | x_refsource_CONFIRM |
Vendor | Product | Version | |
---|---|---|---|
▼ | NVIDIA | GPU Display Driver |
Version: All |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:01:52.082Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/4841" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2019-0012.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0779" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.lenovo.com/us/en/product_security/LEN-28096" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "GPU Display Driver", "vendor": "NVIDIA", "versions": [ { "status": "affected", "version": "All" } ] } ], "descriptions": [ { "lang": "en", "value": "NVIDIA Windows GPU Display Driver (all versions) contains a vulnerability in DirectX drivers, in which a specially crafted shader can cause an out of bounds access of an input texture array, which may lead to denial of service or code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "denial of service, code execution", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-08T18:06:06", "orgId": "9576f279-3576-44b5-a4af-b9a8644b2de6", "shortName": "nvidia" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/4841" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2019-0012.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0779" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.lenovo.com/us/en/product_security/LEN-28096" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@nvidia.com", "ID": "CVE-2019-5684", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "GPU Display Driver", "version": { "version_data": [ { "version_value": "All" } ] } } ] }, "vendor_name": "NVIDIA" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "NVIDIA Windows GPU Display Driver (all versions) contains a vulnerability in DirectX drivers, in which a specially crafted shader can cause an out of bounds access of an input texture array, which may lead to denial of service or code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "denial of service, code execution" } ] } ] }, "references": { "reference_data": [ { "name": "https://nvidia.custhelp.com/app/answers/detail/a_id/4841", "refsource": "CONFIRM", "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/4841" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2019-0012.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2019-0012.html" }, { "name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0779", "refsource": "MISC", "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0779" }, { "name": "https://support.lenovo.com/us/en/product_security/LEN-28096", "refsource": "CONFIRM", "url": "https://support.lenovo.com/us/en/product_security/LEN-28096" } ] } } } }, "cveMetadata": { "assignerOrgId": "9576f279-3576-44b5-a4af-b9a8644b2de6", "assignerShortName": "nvidia", "cveId": "CVE-2019-5684", "datePublished": "2019-08-06T19:48:29", "dateReserved": "2019-01-07T00:00:00", "dateUpdated": "2024-08-04T20:01:52.082Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }