NVIDIA Patches Five Vulnerabilities in Its GPU Display Driver

Tsing

The FPS Review
Staff member
Joined
May 6, 2019
Messages
11,245
Points
83
Some of us like to wait for new drivers to simmer due to unforeseen regressions, but NVIDIA's latest release may be worth installing straight away. That's because the package addresses five vulnerabilities allowing for code execution, denial of service, or escalation of privileges by attackers.

CVE‑2019‑5683: NVIDIA Windows GPU Display Driver contains a vulnerability in the user mode video driver trace logger component. When an attacker has access to the system and creates a hard link, the software does not check for hard link attacks. This behavior may lead to code execution, denial of service, or escalation of privileges.

CVE‑2019‑5684: NVIDIA Windows GPU Display Driver contains a vulnerability in DirectX drivers, in which a specially crafted shader can cause an out of bounds access of an input texture array, which may lead to denial of service or code execution.

CVE‑2019‑5685: NVIDIA Windows GPU Display Driver contains a vulnerability in DirectX drivers, in which a specially crafted shader can cause an out of bounds access to a shader local temporary array, which may lead to denial of service or code execution.

CVE‑2019‑5686: NVIDIA Windows GPU Display Driver contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape in which the software uses an API function or data structure in a way that relies on properties that are not always guaranteed to be valid, which may lead to denial of service.

CVE‑2019‑5687: NVIDIA Windows GPU Display Driver contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape in which an incorrect use of default permissions for an object exposes it to an unintended actor, which may lead to information disclosure or denial of service.

As always, you can grab the patched driver on NVIDIA's driver downloads page.

By abusing these GPU display driver vulnerabilities, would-be attackers can escalate their privileges making it possible to gain permissions above the default ones initially granted by the compromised system. The flaws would also allow them to render vulnerable machines temporarily unusable by triggering a denial of service state or to locally execute malicious code on the compromised Windows systems.
 
Not sure if it's true, but I read somewhere that the attacker has to have direct local access to the machine for this.
 
I checked for the updated driver last night and no dice. (At least through Nvidia's app. This was for the RTX 2080)
 
I found it today for Windows 10.
Its not there for Windows 7, yet.

edit
my mistake, that was the Studio Driver
 
Last edited:
Just checked in my windows 10 install. Still no new drivers for the 2080 RTX.
 
GeForce experience borked itself so I had to reinstall cleanly and no new drivers lol
 
Are we going to see similar vulnerabilities discovered with AMD's driver?
 
Last edited:
Become a Patron!
Back
Top