Privilege escalation in nVidia products - CVE-2017-6256
Published: August 1, 2017
Vulnerability identifier: #VU7616
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear
CVE-ID: CVE-2017-6256
CWE-ID: CWE-20
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vendor: nVidia
Affected software:
NVIDIA Windows GPU Display Driver
NVS
Tesla
NVIDIA Windows GPU Display Driver
NVS
Tesla
Detailed vulnerability description
The vulnerability allows a local attacker to gain elevated privileges on the target system.
The weakness exists in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape due to improper input validation. A local attacker can pass specially crafted values to the driver cause the system to use it as the index to an array, trigger system crash or execute arbitrary code with elevated privileges.
Successful exploitation of the vulnerability may result in system compromise.
The weakness exists in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape due to improper input validation. A local attacker can pass specially crafted values to the driver cause the system to use it as the index to an array, trigger system crash or execute arbitrary code with elevated privileges.
Successful exploitation of the vulnerability may result in system compromise.
How to mitigate CVE-2017-6256
Update GeForce to version 384.94.
Update Quadro, NVS and Tesla to version 377.55, 385.08.
Update Quadro, NVS and Tesla to version 377.55, 385.08.