Privilege escalation in nVidia products - CVE-2016-7389
Published: November 1, 2016
Vulnerability identifier: #VU1108
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Green
CVE-ID: CVE-2016-7389
CWE-ID: CWE-20
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vendor: nVidia
Affected software:
NVIDIA Windows GPU Display Driver
NVS
Quadro
Tesla
NVIDIA Windows GPU Display Driver
NVS
Quadro
Tesla
Detailed vulnerability description
The vulnerability allows a local user toobtain elevated privileges on the target system.
The weakness occurs in the kernel mode layer (nvidia.ko) handler for mmap() and exists due to improper input validation. By sending a specially crafted file, a local attacker can gain access to arbitrary physical memory, leading to an escalation of privileges.
Successful exploitation of the vulnerability results in privilege escalation.
The weakness occurs in the kernel mode layer (nvidia.ko) handler for mmap() and exists due to improper input validation. By sending a specially crafted file, a local attacker can gain access to arbitrary physical memory, leading to an escalation of privileges.
Successful exploitation of the vulnerability results in privilege escalation.
How to mitigate CVE-2016-7389
Update Quadro, NVS and GeForce to 304.132, 340.98, 367.55, 370.28.
Update Tesla to 361.93.03, 367.55.
Update Tesla to 361.93.03, 367.55.