var-201503-0080
Vulnerability from variot
The NVIDIA Display Driver R304 before 309.08, R340 before 341.44, R343 before 345.20, and R346 before 347.52 does not properly validate local client impersonation levels when performing a "kernel administrator check," which allows local users to gain administrator privileges via unspecified API calls. NVIDIA Display Driver is a graphics driver for NVIDIA. A local attacker may exploit this issue to gain root privileges.
To acquire the NVidia driver update, go to hp.com
Select "Support" and then "Download Drivers" Enter your product name or number in the "Find my product" field. Follow the installation instructions to install the NVidia Driver update.
NVidia Driver Update HP Notebooks Version Softpaq
HP EliteBook 8530w Mobile Workstation 341.44 sp70759
HP EliteBook 8540p Notebook PC 341.44 sp70759
HP EliteBook 8530p Notebook PC 341.44 sp70759
HP EliteBook 8760w Mobile Workstation 341.44 sp70759
HP EliteBook 8770w Mobile Workstation 341.44 sp70759
HP EliteBook 8440p Notebook PC 341.44 sp70759
HP EliteBook 8440w Mobile Workstation 341.44 sp70759
HP EliteBook 8540w Mobile Workstation 341.44 sp70759
HP EliteBook 8560w Mobile Workstation 341.44 sp70759
HP EliteBook 8730w Mobile Workstation 341.44 sp70759
HP ZBook 15 G2 Mobile Workstation 341.44 sp70759
HP EliteBook 8740w Mobile Workstation 341.44 sp70759
HP ZBook 15 Mobile Workstation 341.44 sp70759
HP EliteBook 8570w Mobile Workstation 341.44 sp70759
HP ZBook 17 G2 Mobile Workstation 341.44 sp70759
HP ZBook 17 Mobile Workstation 341.44 sp70759
HP Workstations Version Softpaq
HP Z1 G2 Touch Workstation 347.52 sp70633
HP Z1 G2 Workstation 347.52 sp70633
HP Z210 CMT Workstation 341.44 sp70898
HP Z210 SFF Workstation 341.44 sp70898
HP Z220 CMT Workstation 347.52 sp70633
HP Z220 SFF Workstation 347.52 sp70633
HP Z230 SFF Workstation 347.52 sp70633
HP Z230 Tower Workstation 347.52 sp70633
HP Z400 Workstation 341.44 sp70898
HP Z420 Workstation 347.52 sp70633
HP Z440 Workstation 347.52 sp70633
HP Z600 Workstation 341.44 sp70898
HP Z620 Workstation 347.52 sp70633
HP Z640 Workstation 347.52 sp70633
HP Z800 Workstation 341.44 sp70898
HP Z820 Workstation 347.52 sp70633
HP Z840 Workstation 347.52 sp70633
HISTORY Version:1 (rev.1) - 30 May 2015 Initial release
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Note: the current version of the following document is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04579346
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c04579346 Version: 1
HPSBHF03272 rev.1 - HP Servers with NVidia GPU Computing Driver running Windows Server 2008, Elevation of Privilege
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.
Release Date: 2015-04-24 Last Updated: 2015-04-24
Potential Security Impact: Elevation of privileges
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY A potential security vulnerability has been identified with certain HP Servers with NVidia GPU Computing Driver running Windows Server 2008. This vulnerability could be exploited resulting in elevation of privilege.
References:
CVE-2015-1170 SSRT101950
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. See the RESOLUTION Section for a table of impacted HP Servers with NVidia GPU Computing Driver running Windows Server 2008.
Note: the server is impacted if running an NVidia Driver earlier than v3.21.19.
BACKGROUND
CVSS 2.0 Base Metrics
Reference Base Vector Base Score CVE-2015-1170 (AV:L/AC:M/Au:S/C:C/I:C/A:C) 6.6 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002
RESOLUTION HP has provided a driver update for the impacted platforms to resolve the vulnerability in HP Servers with NVidia GPU Computing Driver running Windows Server 2008.
HP has provided an updated NVidia firmware driver version that resolves the security vulnerability.
Go to support and drivers. Search for the server model and then choose the Windows operating system. Select either one of the following: "Driver GPU Computing (NVidia)" for NVidia Tesla Models Driver Graphics NVidia for NVidia Quadro Models
HP Server Model NVidia Accelerator type Driver Version
DL360 G7 Quadro 4000 v3.21.19 or later
SL390s G7 Tesla Models: M2050, M2070, M2070Q, M2075, M2090 v3.21.19 or later
DL160 Gen8 Quadro 4000 v3.21.19 or later
ML350p Gen8 Quadro 4000, Quadro 6000 v3.21.19 or later
DL360e Gen8 Quadro 4000, Quadro K4200 v3.21.19 or later
DL380e Gen8 Quadro 4000, Quadro 6000 v3.21.19 or later
DL380e Gen8 Quadro 4000, Quadro 6000 v3.21.19 or later
SL250s Gen8 Tesla Models: M2070Q, M2075, M2090, K10, K20, K20X v3.21.19 or later
SL270s Gen8 Tesla Models: M2070Q, M2075, M2090, K10, K20, K20X v3.21.19 or later
SL270s Gen8 SE Tesla Models: K10, K20, K20X v3.21.19 or later
HISTORY Version:1 (rev.1) - 24 April 2015 Initial release
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.
3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX
Copyright 2015 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners.
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.13 (GNU/Linux)
iEYEARECAAYFAlU6gz0ACgkQ4B86/C0qfVlSFwCg9iMcSmmkABtkCHOR1/+6bg9Z XGMAoLLU03G8rp3aVxO6KW9FWESqbHhG =Oo46 -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201503-0080", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "gpu driver r343", "scope": "lte", "trust": 1.0, "vendor": "nvidia", "version": "345.19" }, { "model": "gpu driver r304", "scope": "lte", "trust": 1.0, "vendor": "nvidia", "version": "309.07" }, { "model": "gpu driver r346", "scope": "lte", "trust": 1.0, "vendor": "nvidia", "version": "347.51" }, { "model": "gpu driver r340", "scope": "lte", "trust": 1.0, "vendor": "nvidia", "version": "341.43" }, { "model": "gpu display driver", "scope": "lt", "trust": 0.8, "vendor": "nvidia", "version": "r304 309.08" }, { "model": "gpu display driver", "scope": "lt", "trust": 0.8, "vendor": "nvidia", "version": "r340 341.44" }, { "model": "gpu display driver", "scope": "lt", "trust": 0.8, "vendor": "nvidia", "version": "r343 345.20" }, { "model": "gpu display driver", "scope": "lt", "trust": 0.8, "vendor": "nvidia", "version": "r346 347.52" }, { "model": "display driver r304", "scope": "eq", "trust": 0.6, "vendor": "nvidia", "version": "(\u003c309.08)" }, { "model": "display driver r340", "scope": "eq", "trust": 0.6, "vendor": "nvidia", "version": "(341.44)" }, { "model": "display driver", "scope": "eq", "trust": 0.6, "vendor": "nvidia", "version": "343(345.20)" }, { "model": "display driver r346", "scope": "eq", "trust": 0.6, "vendor": "nvidia", "version": "(347.52)" }, { "model": "gpu driver r340", "scope": "eq", "trust": 0.6, "vendor": "nvidia", "version": "341.43" }, { "model": "gpu driver r343", "scope": "eq", "trust": 0.6, "vendor": "nvidia", "version": "345.19" }, { "model": "gpu driver r346", "scope": "eq", "trust": 0.6, "vendor": "nvidia", "version": "347.51" }, { "model": "gpu driver r304", "scope": "eq", "trust": 0.6, "vendor": "nvidia", "version": "309.07" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-01633" }, { "db": "JVNDB", "id": "JVNDB-2015-001710" }, { "db": "NVD", "id": "CVE-2015-1170" }, { "db": "CNNVD", "id": "CNNVD-201503-124" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:nvidia:gpu_driver_r304:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "309.07", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nvidia:gpu_driver_r340:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "341.43", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nvidia:gpu_driver_r343:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "345.19", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nvidia:gpu_driver_r346:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "347.51", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2015-1170" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "James Forshaw from Project Zero, Google", "sources": [ { "db": "BID", "id": "73442" } ], "trust": 0.3 }, "cve": "CVE-2015-1170", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.2, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2015-1170", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CNVD-2015-01633", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2015-1170", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2015-01633", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201503-124", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-01633" }, { "db": "JVNDB", "id": "JVNDB-2015-001710" }, { "db": "NVD", "id": "CVE-2015-1170" }, { "db": "CNNVD", "id": "CNNVD-201503-124" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The NVIDIA Display Driver R304 before 309.08, R340 before 341.44, R343 before 345.20, and R346 before 347.52 does not properly validate local client impersonation levels when performing a \"kernel administrator check,\" which allows local users to gain administrator privileges via unspecified API calls. NVIDIA Display Driver is a graphics driver for NVIDIA. \nA local attacker may exploit this issue to gain root privileges. \n\nTo acquire the NVidia driver update, go to hp.com\n\nSelect \"Support\" and then \"Download Drivers\"\nEnter your product name or number in the \"Find my product\" field. Follow the installation\ninstructions to install the NVidia Driver update. \n\nNVidia Driver Update HP Notebooks\n Version\n Softpaq\n\nHP EliteBook 8530w Mobile Workstation\n 341.44\n sp70759\n\nHP EliteBook 8540p Notebook PC\n 341.44\n sp70759\n\nHP EliteBook 8530p Notebook PC\n 341.44\n sp70759\n\nHP EliteBook 8760w Mobile Workstation\n 341.44\n sp70759\n\nHP EliteBook 8770w Mobile Workstation\n 341.44\n sp70759\n\nHP EliteBook 8440p Notebook PC\n 341.44\n sp70759\n\nHP EliteBook 8440w Mobile Workstation\n 341.44\n sp70759\n\nHP EliteBook 8540w Mobile Workstation\n 341.44\n sp70759\n\nHP EliteBook 8560w Mobile Workstation\n 341.44\n sp70759\n\nHP EliteBook 8730w Mobile Workstation\n 341.44\n sp70759\n\nHP ZBook 15 G2 Mobile Workstation\n 341.44\n sp70759\n\nHP EliteBook 8740w Mobile Workstation\n 341.44\n sp70759\n\nHP ZBook 15 Mobile Workstation\n 341.44\n sp70759\n\nHP EliteBook 8570w Mobile Workstation\n 341.44\n sp70759\n\nHP ZBook 17 G2 Mobile Workstation\n 341.44\n sp70759\n\nHP ZBook 17 Mobile Workstation\n 341.44\n sp70759\n\nHP Workstations\n Version\n Softpaq\n\nHP Z1 G2 Touch Workstation\n 347.52\n sp70633\n\nHP Z1 G2 Workstation\n 347.52\n sp70633\n\nHP Z210 CMT Workstation\n 341.44\n sp70898\n\nHP Z210 SFF Workstation\n 341.44\n sp70898\n\nHP Z220 CMT Workstation\n 347.52\n sp70633\n\nHP Z220 SFF Workstation\n 347.52\n sp70633\n\nHP Z230 SFF Workstation\n 347.52\n sp70633\n\nHP Z230 Tower Workstation\n 347.52\n sp70633\n\nHP Z400 Workstation\n 341.44\n sp70898\n\nHP Z420 Workstation\n 347.52\n sp70633\n\nHP Z440 Workstation\n 347.52\n sp70633\n\nHP Z600 Workstation\n 341.44\n sp70898\n\nHP Z620 Workstation\n 347.52\n sp70633\n\nHP Z640 Workstation\n 347.52\n sp70633\n\nHP Z800 Workstation\n 341.44\n sp70898\n\nHP Z820 Workstation\n 347.52\n sp70633\n\nHP Z840 Workstation\n 347.52\n sp70633\n\nHISTORY\nVersion:1 (rev.1) - 30 May 2015 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer\u0027s patch management policy. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nNote: the current version of the following document is available here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/\ndocDisplay?docId=emr_na-c04579346\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: c04579346\nVersion: 1\n\nHPSBHF03272 rev.1 - HP Servers with NVidia GPU Computing Driver running\nWindows Server 2008, Elevation of Privilege\n\nNOTICE: The information in this Security Bulletin should be acted upon as\nsoon as possible. \n\nRelease Date: 2015-04-24\nLast Updated: 2015-04-24\n\nPotential Security Impact: Elevation of privileges\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nA potential security vulnerability has been identified with certain HP\nServers with NVidia GPU Computing Driver running Windows Server 2008. This\nvulnerability could be exploited resulting in elevation of privilege. \n\nReferences:\n\nCVE-2015-1170\nSSRT101950\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \nSee the RESOLUTION\n Section for a table of impacted HP Servers with NVidia GPU Computing Driver\nrunning Windows Server 2008. \n\nNote: the server is impacted if running an NVidia Driver earlier than\nv3.21.19. \n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n Reference Base Vector Base Score\nCVE-2015-1170 (AV:L/AC:M/Au:S/C:C/I:C/A:C) 6.6\n===========================================================\n Information on CVSS is documented\n in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\nHP has provided a driver update for the impacted platforms to resolve the\nvulnerability in HP Servers with NVidia GPU Computing Driver running Windows\nServer 2008. \n\nHP has provided an updated NVidia firmware driver version that resolves the\nsecurity vulnerability. \n\nGo to support and drivers. \nSearch for the server model and then choose the Windows operating system. \nSelect either one of the following:\n\"Driver GPU Computing (NVidia)\" for NVidia Tesla Models\nDriver Graphics NVidia for NVidia Quadro Models\n\nHP Server Model\n NVidia Accelerator type\n Driver Version\n\nDL360 G7\n Quadro 4000\n v3.21.19 or later\n\nSL390s G7\n Tesla Models: M2050, M2070, M2070Q, M2075, M2090\n v3.21.19 or later\n\nDL160 Gen8\n Quadro 4000\n v3.21.19 or later\n\nML350p Gen8\n Quadro 4000, Quadro 6000\n v3.21.19 or later\n\nDL360e Gen8\n Quadro 4000, Quadro K4200\n v3.21.19 or later\n\nDL380e Gen8\n Quadro 4000, Quadro 6000\n v3.21.19 or later\n\nDL380e Gen8\n Quadro 4000, Quadro 6000\n v3.21.19 or later\n\nSL250s Gen8\n Tesla Models: M2070Q, M2075, M2090, K10, K20, K20X\n v3.21.19 or later\n\nSL270s Gen8\n Tesla Models: M2070Q, M2075, M2090, K10, K20, K20X\n v3.21.19 or later\n\nSL270s Gen8 SE\n Tesla Models: K10, K20, K20X\n v3.21.19 or later\n\nHISTORY\nVersion:1 (rev.1) - 24 April 2015 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer\u0027s patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HP Services support channel. For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com. \n\nReport: To report a potential security vulnerability with any HP supported\nproduct, send Email to: security-alert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin\nalerts via Email:\nhttp://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HP General Software\nHF = HP Hardware and Firmware\nMP = MPE/iX\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPI = Printing and Imaging\nPV = ProCurve\nST = Storage Software\nTU = Tru64 UNIX\nUX = HP-UX\n\nCopyright 2015 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. The information provided is provided \"as is\"\nwithout warranty of any kind. To the extent permitted by law, neither HP or\nits affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits; damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. \nHewlett-Packard Company and the names of Hewlett-Packard products referenced\nherein are trademarks of Hewlett-Packard Company in the United States and\nother countries. Other product and company names mentioned herein may be\ntrademarks of their respective owners. \n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.13 (GNU/Linux)\n\niEYEARECAAYFAlU6gz0ACgkQ4B86/C0qfVlSFwCg9iMcSmmkABtkCHOR1/+6bg9Z\nXGMAoLLU03G8rp3aVxO6KW9FWESqbHhG\n=Oo46\n-----END PGP SIGNATURE-----\n", "sources": [ { "db": "NVD", "id": "CVE-2015-1170" }, { "db": "JVNDB", "id": "JVNDB-2015-001710" }, { "db": "CNVD", "id": "CNVD-2015-01633" }, { "db": "BID", "id": "73442" }, { "db": "PACKETSTORM", "id": "131216" }, { "db": "PACKETSTORM", "id": "131625" } ], "trust": 2.61 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-1170", "trust": 3.5 }, { "db": "SECTRACK", "id": "1032013", "trust": 1.0 }, { "db": "JVNDB", "id": "JVNDB-2015-001710", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2015-01633", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201503-124", "trust": 0.6 }, { "db": "BID", "id": "73442", "trust": 0.3 }, { "db": "PACKETSTORM", "id": "131216", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "131625", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-01633" }, { "db": "BID", "id": "73442" }, { "db": "JVNDB", "id": "JVNDB-2015-001710" }, { "db": "PACKETSTORM", "id": "131216" }, { "db": "PACKETSTORM", "id": "131625" }, { "db": "NVD", "id": "CVE-2015-1170" }, { "db": "CNNVD", "id": "CNNVD-201503-124" } ] }, "id": "VAR-201503-0080", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2015-01633" } ], "trust": 1.433333335 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-01633" } ] }, "last_update_date": "2023-12-18T14:06:05.096000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HPSBHF03271", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en\u0026cc=us\u0026objectid=c04577892" }, { "title": "CVE-2015-1170: Windows Privilege Impersonation Check", "trust": 0.8, "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/3634" }, { "title": "NVIDIA Display Driver R304 Patch for Enhancing Privilege Vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/56175" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-01633" }, { "db": "JVNDB", "id": "JVNDB-2015-001710" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-264", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-001710" }, { "db": "NVD", "id": "CVE-2015-1170" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/3634" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=142781493222653\u0026w=2" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=143013598825091\u0026w=2" }, { "trust": 1.0, "url": "http://www.securitytracker.com/id/1032013" }, { "trust": 1.0, "url": "https://support.lenovo.com/product_security/nvidia_windows_privilege" }, { "trust": 1.0, "url": "https://support.lenovo.com/us/en/product_security/nvidia_windows_privilege" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1170" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-1170" }, { "trust": 0.3, "url": "http://www.nvidia.com" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1170" }, { "trust": 0.2, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/" }, { "trust": 0.2, "url": "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins" }, { "trust": 0.2, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/" }, { "trust": 0.1, "url": "http://www.hp.com" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-01633" }, { "db": "BID", "id": "73442" }, { "db": "JVNDB", "id": "JVNDB-2015-001710" }, { "db": "PACKETSTORM", "id": "131216" }, { "db": "PACKETSTORM", "id": "131625" }, { "db": "NVD", "id": "CVE-2015-1170" }, { "db": "CNNVD", "id": "CNNVD-201503-124" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2015-01633" }, { "db": "BID", "id": "73442" }, { "db": "JVNDB", "id": "JVNDB-2015-001710" }, { "db": "PACKETSTORM", "id": "131216" }, { "db": "PACKETSTORM", "id": "131625" }, { "db": "NVD", "id": "CVE-2015-1170" }, { "db": "CNNVD", "id": "CNNVD-201503-124" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-03-13T00:00:00", "db": "CNVD", "id": "CNVD-2015-01633" }, { "date": "2015-03-06T00:00:00", "db": "BID", "id": "73442" }, { "date": "2015-03-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-001710" }, { "date": "2015-03-31T15:57:44", "db": "PACKETSTORM", "id": "131216" }, { "date": "2015-04-24T23:45:00", "db": "PACKETSTORM", "id": "131625" }, { "date": "2015-03-06T23:59:02.263000", "db": "NVD", "id": "CVE-2015-1170" }, { "date": "2015-03-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201503-124" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-03-13T00:00:00", "db": "CNVD", "id": "CNVD-2015-01633" }, { "date": "2015-07-15T00:13:00", "db": "BID", "id": "73442" }, { "date": "2015-04-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-001710" }, { "date": "2016-12-08T03:07:22.887000", "db": "NVD", "id": "CVE-2015-1170" }, { "date": "2015-03-11T00:00:00", "db": "CNNVD", "id": "CNNVD-201503-124" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "73442" }, { "db": "PACKETSTORM", "id": "131216" }, { "db": "CNNVD", "id": "CNNVD-201503-124" } ], "trust": 1.0 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "NVIDIA GPU Vulnerability of obtaining administrator privileges in display driver", "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-001710" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control", "sources": [ { "db": "CNNVD", "id": "CNNVD-201503-124" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.