Security Bulletin: Vulnerabilities in NVIDIA Windows GPU Display Driver and NVIDIA GeForce Experience

Updated 09/29/2021 01:04 PM

NVIDIA Windows GPU Display Driver contains multiple vulnerabilities in the kernel mode layer (nvlddmkm.sys) handler and NVIDIA GeForce Experience contains a vulnerability in the kernel mode layer (nvstreamkms.sys)

Go to NVIDIA Product Security.


Vulnerability Details

CVE-2016-8805

NVIDIA Windows GPU Display Driver contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape ID 0x7000014 where a value passed from a user to the driver is used without validation as the index to an internal array, leading to denial of service or potential escalation of privileges.

CVSS Base Score: 8.8 CVSS Temporal Score: 7.9 CVSS Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C

CVE-2016-8806

NVIDIA Windows GPU Display Driver contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape ID 0x5000027 where a pointer passed from a user to the driver is used without validation, leading to denial of service or potential escalation of privileges.

CVSS Base Score: 8.8 CVSS Temporal Score: 7.9 CVSS Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C

CVE-2016-8807

NVIDIA Windows GPU Display Driver contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape ID 0x10000e9 where a value is passed from a user to the driver is used without validation as the size input to memcpy() causing a stack buffer overflow, leading to denial of service or potential escalation of privileges.

CVSS Base Score: 8.8 CVSS Temporal Score: 7.9 CVSS Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C

CVE-2016-8808

NVIDIA Windows GPU Display Driver contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape ID 0x70000d5 where a value passed from a user to the driver is used without validation as the index to an internal array, leading to denial of service or potential escalation of privileges.

CVSS Base Score: 8.8 CVSS Temporal Score: 7.9 CVSS Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C

CVE-2016-8809

NVIDIA Windows GPU Display Driver contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape ID 0x70001b2 where the size of an input buffer is not validated, leading to denial of service or potential escalation of privileges.

CVSS Base Score: 8.8 CVSS Temporal Score: 7.9 CVSS Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C

CVE-2016-8810

NVIDIA Windows GPU Display Driver contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape ID 0x100009a where a value passed from a user to the driver is used without validation as the index to an internal array, leading to denial of service or potential escalation of privileges.

CVSS Base Score: 8.8 CVSS Temporal Score: 7.9 CVSS Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C

CVE-2016-8811

NVIDIA Windows GPU Display Driver contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape ID 0x7000170 where the size of an input buffer is not validated, leading to denial of service or potential escalation of privileges.

CVSS Base Score: 8.8 CVSS Temporal Score: 7.9 CVSS Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C

CVE-2016-8812

NVIDIA GeForce Experience contains a vulnerability in the kernel mode layer (nvstreamkms.sys) allowing a user to cause a stack buffer overflow with specially crafted executable paths, leading to a denial of service or escalation of privileges.

CVSS Base Score: 8.8 CVSS Temporal Score: 7.9 CVSS Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C

CVE-2016-7391

NVIDIA Windows GPU Display Driver contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape ID 0x100010b where a missing array bounds check can allow a user to write to kernel memory, leading to denial of service or potential escalation of privileges.

CVSS Base Score: 6.8 CVSS Temporal Score: 5.3 CVSS v2 Vector: (AV:L/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:OF/RC:ND)

CVE-2016-7387

NVIDIA Windows GPU Display Driver contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape ID 0x600000D where a value passed from a user to the driver is used without validation as the index to an internal array, leading to denial of service or potential escalation of privileges.

CVSS Base Score: 6.8 CVSS Temporal Score: 5.3 CVSS v2 Vector: (AV:L/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:OF/RC:C)

CVE-2016-7385

NVIDIA Windows GPU Display Driver contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape ID 0x700010d where a value passed from a user to the driver is used without validation as the index to an internal array, leading to denial of service or potential escalation of privileges.

CVSS Base Score: 6.8 CVSS Temporal Score: 5.3 CVSS v2 Vector: (AV:L/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:OF/RC:C)

CVE-2016-7390

NVIDIA Windows GPU Display Driver contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape ID 0x7000194 where a value passed from a user to the driver is used without validation as the index to an internal array, leading to denial of service or potential escalation of privileges.

CVSS Base Score: 6.8 CVSS Temporal Score: 5.3 CVSS v2 Vector: (AV:L/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:OF/RC:C)

CVE-2016-7382

NVIDIA GPU Display Driver contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler where a missing permissions check may allow users to gain access to arbitrary physical memory, leading to an escalation of privileges.

CVSS Base Score: 6.8 CVSS Temporal Score: 5.3 CVSS v2 Vector: (AV:L/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:OF/RC:C)

CVE-2016-7384

NVIDIA Windows GPU Display Driver contains a vulnerability in the kernel mode layer (nvlddmkm.sys) where unchecked input/output lengths in UVMLiteController Device IO Control handling may lead to denial of service or potential escalation of privileges.

CVSS Base Score: 6.8 CVSS Temporal Score: 5.3 CVSS v2 Vector: (AV:L/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:OF/RC:C)

CVE-2016-7388

NVIDIA Windows GPU Display Driver contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler where a NULL pointer dereference caused by invalid user input may lead to denial of service or potential escalation of privileges.

CVSS Base Score: 6.8 CVSS Temporal Score: 5.3 CVSS v2 Vector: (AV:L/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:OF/RC:C)

CVE-2016-7381

NVIDIA Windows GPU Display Driver contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape where a user input to index an array is not bounds checked, leading to denial of service or potential escalation of privileges.

CVSS Base Score: 6.8 CVSS Temporal Score: 5 CVSS v2 Vector: (AV:L/AC:L/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C)

CVE-2016-7383

NVIDIA Windows GPU Display Driver contains a vulnerability in a memory mapping API in the kernel mode layer (nvlddmkm.sys) handler, leading to denial of service or potential escalation of privileges.

CVSS Base Score: 5.7 CVSS Temporal Score: 4.5 CVSS v2 Vector: (AV:L/AC:L/Au:S/C:P/I:P/A:C/E:POC/RL:OF/RC:C)

CVE-2016-7386

NVIDIA Windows GPU Display Driver contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape ID 0x70000D4 which may lead to leaking of kernel memory contents to user space through an uninitialized buffer.

CVSS Base Score: 1.7 CVSS Temporal Score: 1.3 CVSS v2 Vector: (AV:L/AC:L/Au:S/C:P/I:N/A:N/E:POC/RL:OF/RC:C)

NVIDIA’s risk assessment is based on an average of risk across a diverse set of installed systems and may not represent the true risk of your local installation. NVIDIA recommends consulting a local security or IT professional to evaluate the risk of your specific configuration. NVIDIA doesn't know of any exploits to these issues at this time.

Affected Products

Fixes

You can download the fixes from the NVIDIA Driver Downloads page.

Mitigations

None

Acknowledgements

NVIDIA was informed of the following CVEs by Oliver Chang, working with Google Project Zero: CVE-2016-8805, CVE-2016-8806, CVE-2016-8807, CVE-2016-8808, CVE-2016-8809, CVE-2016-8810, CVE-2016-8811, CVE-2016-8812, CVE-2016-7391, CVE-2016-7387, CVE-2016-7385, CVE-2016-7390, CVE-2016-7384, and CVE-2016-7386

Revision History

Revision History
Revision Date Description
5.0 March 9, 2017 Added information about fixes available for affected NVIDIA GRID products
4.1 January 11, 2017 Corrected a typographical error in the name of the DxgkDdiEscape function
4.0 January 4, 2017 Added information about fixes available for affected NVIDIA GRID products
3.0 November 21, 2016 Added information about fixes available for affected NVIDIA GRID products
2.0 November 16, 2016 Added information about fixes available for affected Tesla products
1.1 November 2, 2016 Added information about fixes available for GeForce GPUs with Tesla architecture
1.0 October 28, 2016 Initial release

Frequently Asked Questions (FAQs)

How do I know what driver version I have installed?

  1. Launch Windows Device Manager.
  2. Select Display Adapters.
  3. Select the NVIDIA GPU node and right-click.
  4. Select the Driver tab.

The driver version can be deciphered as shown in the following examples: 10.18.13.6472 is 364.72 and 10.18.13.472 is 304.72

Disclaimer

ALL NVIDIA INFORMATION, DESIGN SPECIFICATIONS, REFERENCE BOARDS, FILES, DRAWINGS, DIAGNOSTICS, LISTS, AND OTHER DOCUMENTS (TOGETHER AND SEPARATELY, “MATERIALS”) ARE BEING PROVIDED “AS IS.” NVIDIA MAKES NO WARRANTIES, EXPRESS, IMPLIED, STATUTORY, OR OTHERWISE WITH RESPECT TO THE MATERIALS, AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OR CONDITION OF TITLE, MERCHANTABILITY, SATISFACTORY QUALITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT, ARE HEREBY EXCLUDED TO THE MAXIMUM EXTENT PERMITTED BY LAW.

Information furnished is believed to be accurate and reliable. However, NVIDIA Corporation assumes no responsibility for the consequences of use of such information or for any infringement of patents or other rights of third parties that may result from its use. No license is granted by implication or otherwise under any patent or patent rights of NVIDIA Corporation. Specifications mentioned in this publication are subject to change without notice. This publication supersedes and replaces all information previously supplied. NVIDIA Corporation products are not authorized for use as critical components in life support devices or systems without express written approval of NVIDIA Corporation.

Is this answer helpful?

Live Chat

Chat online with one of our support agents

CHAT NOW

ASK US A QUESTION

Contact Support for assistance

800.797.6530

Ask a Question