Vulnerabilities > CVE-2016-8826 - Resource Management Errors vulnerability in Nvidia GPU Driver
Attack vector
LOCAL Attack complexity
LOW Privileges required
LOW Confidentiality impact
NONE Integrity impact
NONE Availability impact
HIGH Summary
All versions of NVIDIA GPU Display Driver contain a vulnerability in the kernel mode layer (nvlddmkm.sys for Windows or nvidia.ko for Linux) where a user can cause a GPU interrupt storm, leading to a denial of service.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 | |
OS | 1 | |
OS | 1 |
Common Weakness Enumeration (CWE)
Nessus
NASL family Ubuntu Local Security Checks NASL id UBUNTU_USN-3173-1.NASL description It was discovered that the NVIDIA graphics drivers contained a flaw in the kernel mode layer. A local attacker could use this issue to cause a denial of service. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 96605 published 2017-01-18 reporter Ubuntu Security Notice (C) 2017-2019 Canonical, Inc. / NASL script (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/96605 title Ubuntu 12.04 LTS / 14.04 LTS / 16.04 LTS / 16.10 : nvidia-graphics-drivers-304 and nvidia-graphics-drivers-340 vulnerability (USN-3173-1) code # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Ubuntu Security Notice USN-3173-1. The text # itself is copyright (C) Canonical, Inc. See # <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered # trademark of Canonical, Inc. # include("compat.inc"); if (description) { script_id(96605); script_version("3.7"); script_cvs_date("Date: 2019/09/18 12:31:46"); script_cve_id("CVE-2016-8826"); script_xref(name:"USN", value:"3173-1"); script_name(english:"Ubuntu 12.04 LTS / 14.04 LTS / 16.04 LTS / 16.10 : nvidia-graphics-drivers-304 and nvidia-graphics-drivers-340 vulnerability (USN-3173-1)"); script_summary(english:"Checks dpkg output for updated packages."); script_set_attribute( attribute:"synopsis", value: "The remote Ubuntu host is missing one or more security-related patches." ); script_set_attribute( attribute:"description", value: "It was discovered that the NVIDIA graphics drivers contained a flaw in the kernel mode layer. A local attacker could use this issue to cause a denial of service. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues." ); script_set_attribute( attribute:"see_also", value:"https://usn.ubuntu.com/3173-1/" ); script_set_attribute(attribute:"solution", value:"Update the affected packages."); script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"); script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:nvidia-304"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:nvidia-304-updates"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:nvidia-331"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:nvidia-331-updates"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:nvidia-340"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:nvidia-340-updates"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:nvidia-current"); script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:12.04:-:lts"); script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:14.04"); script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:16.04"); script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:16.10"); script_set_attribute(attribute:"vuln_publication_date", value:"2016/12/16"); script_set_attribute(attribute:"patch_publication_date", value:"2017/01/17"); script_set_attribute(attribute:"plugin_publication_date", value:"2017/01/18"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"Ubuntu Security Notice (C) 2017-2019 Canonical, Inc. / NASL script (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Ubuntu Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/cpu", "Host/Ubuntu", "Host/Ubuntu/release", "Host/Debian/dpkg-l"); exit(0); } include("audit.inc"); include("ubuntu.inc"); include("misc_func.inc"); if ( ! get_kb_item("Host/local_checks_enabled") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/Ubuntu/release"); if ( isnull(release) ) audit(AUDIT_OS_NOT, "Ubuntu"); release = chomp(release); if (! preg(pattern:"^(12\.04|14\.04|16\.04|16\.10)$", string:release)) audit(AUDIT_OS_NOT, "Ubuntu 12.04 / 14.04 / 16.04 / 16.10", "Ubuntu " + release); if ( ! get_kb_item("Host/Debian/dpkg-l") ) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Ubuntu", cpu); flag = 0; if (ubuntu_check(osver:"12.04", pkgname:"nvidia-304", pkgver:"304.134-0ubuntu0.12.04.1")) flag++; if (ubuntu_check(osver:"12.04", pkgname:"nvidia-304-updates", pkgver:"304.134-0ubuntu0.12.04.1")) flag++; if (ubuntu_check(osver:"12.04", pkgname:"nvidia-331", pkgver:"340.101-0ubuntu0.12.04.1")) flag++; if (ubuntu_check(osver:"12.04", pkgname:"nvidia-331-updates", pkgver:"340.101-0ubuntu0.12.04.1")) flag++; if (ubuntu_check(osver:"12.04", pkgname:"nvidia-340", pkgver:"340.101-0ubuntu0.12.04.1")) flag++; if (ubuntu_check(osver:"12.04", pkgname:"nvidia-340-updates", pkgver:"340.101-0ubuntu0.12.04.1")) flag++; if (ubuntu_check(osver:"12.04", pkgname:"nvidia-current", pkgver:"304.134-0ubuntu0.12.04.1")) flag++; if (ubuntu_check(osver:"14.04", pkgname:"nvidia-304", pkgver:"304.134-0ubuntu0.14.04.1")) flag++; if (ubuntu_check(osver:"14.04", pkgname:"nvidia-304-updates", pkgver:"304.134-0ubuntu0.14.04.1")) flag++; if (ubuntu_check(osver:"14.04", pkgname:"nvidia-331", pkgver:"340.101-0ubuntu0.14.04.1")) flag++; if (ubuntu_check(osver:"14.04", pkgname:"nvidia-331-updates", pkgver:"340.101-0ubuntu0.14.04.1")) flag++; if (ubuntu_check(osver:"14.04", pkgname:"nvidia-340", pkgver:"340.101-0ubuntu0.14.04.1")) flag++; if (ubuntu_check(osver:"14.04", pkgname:"nvidia-340-updates", pkgver:"340.101-0ubuntu0.14.04.1")) flag++; if (ubuntu_check(osver:"14.04", pkgname:"nvidia-current", pkgver:"304.134-0ubuntu0.14.04.1")) flag++; if (ubuntu_check(osver:"16.04", pkgname:"nvidia-304", pkgver:"304.134-0ubuntu0.16.04.1")) flag++; if (ubuntu_check(osver:"16.04", pkgname:"nvidia-304-updates", pkgver:"304.134-0ubuntu0.16.04.1")) flag++; if (ubuntu_check(osver:"16.04", pkgname:"nvidia-331", pkgver:"340.101-0ubuntu0.16.04.1")) flag++; if (ubuntu_check(osver:"16.04", pkgname:"nvidia-331-updates", pkgver:"340.101-0ubuntu0.16.04.1")) flag++; if (ubuntu_check(osver:"16.04", pkgname:"nvidia-340", pkgver:"340.101-0ubuntu0.16.04.1")) flag++; if (ubuntu_check(osver:"16.04", pkgname:"nvidia-340-updates", pkgver:"340.101-0ubuntu0.16.04.1")) flag++; if (ubuntu_check(osver:"16.04", pkgname:"nvidia-current", pkgver:"304.134-0ubuntu0.16.04.1")) flag++; if (ubuntu_check(osver:"16.10", pkgname:"nvidia-304", pkgver:"304.134-0ubuntu0.16.10.1")) flag++; if (ubuntu_check(osver:"16.10", pkgname:"nvidia-304-updates", pkgver:"304.134-0ubuntu0.16.10.1")) flag++; if (ubuntu_check(osver:"16.10", pkgname:"nvidia-331", pkgver:"340.101-0ubuntu0.16.10.1")) flag++; if (ubuntu_check(osver:"16.10", pkgname:"nvidia-331-updates", pkgver:"340.101-0ubuntu0.16.10.1")) flag++; if (ubuntu_check(osver:"16.10", pkgname:"nvidia-340", pkgver:"340.101-0ubuntu0.16.10.1")) flag++; if (ubuntu_check(osver:"16.10", pkgname:"nvidia-340-updates", pkgver:"340.101-0ubuntu0.16.10.1")) flag++; if (ubuntu_check(osver:"16.10", pkgname:"nvidia-current", pkgver:"304.134-0ubuntu0.16.10.1")) flag++; if (flag) { security_report_v4( port : 0, severity : SECURITY_WARNING, extra : ubuntu_report_get() ); exit(0); } else { tested = ubuntu_pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "nvidia-304 / nvidia-304-updates / nvidia-331 / nvidia-331-updates / etc"); }
NASL family Misc. NASL id NVIDIA_UNIX_CVE_2016_8826.NASL description The version of the NVIDIA GPU display driver installed on the remote Linux host is 304.x prior to 304.134, 340.x prior to 340.101, 361.x prior to 361.107 (Tesla P100), 375.x prior to 375.20 (Tesla P100), or 375.x prior to 370.26. It is, therefore, affected by a denial of service vulnerability due to a flaw in the kernel mode layer (nvidia.ko) driver. A local attacker can exploit this to cause GPU interrupt saturation, resulting in a denial of service condition. last seen 2020-06-01 modified 2020-06-02 plugin id 96001 published 2016-12-21 reporter This script is Copyright (C) 2016-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/96001 title NVIDIA Linux GPU Display Driver 304.x < 304.134 / 340.x < 340.101 / 361.x < 361.107 / 375.x < 375.26 GPU Interrupt Saturation DoS code # # (C) Tenable Network Security, Inc. # include("compat.inc"); if (description) { script_id(96001); script_version("1.6"); script_cvs_date("Date: 2018/11/15 20:50:23"); script_cve_id("CVE-2016-8826"); script_bugtraq_id(94957); script_name(english:"NVIDIA Linux GPU Display Driver 304.x < 304.134 / 340.x < 340.101 / 361.x < 361.107 / 375.x < 375.26 GPU Interrupt Saturation DoS"); script_summary(english:"Checks the driver version."); script_set_attribute(attribute:"synopsis", value: "A display driver installed on the remote Linux host is affected by a denial of service vulnerability."); script_set_attribute(attribute:"description", value: "The version of the NVIDIA GPU display driver installed on the remote Linux host is 304.x prior to 304.134, 340.x prior to 340.101, 361.x prior to 361.107 (Tesla P100), 375.x prior to 375.20 (Tesla P100), or 375.x prior to 370.26. It is, therefore, affected by a denial of service vulnerability due to a flaw in the kernel mode layer (nvidia.ko) driver. A local attacker can exploit this to cause GPU interrupt saturation, resulting in a denial of service condition."); script_set_attribute(attribute:"see_also", value:"https://nvidia.custhelp.com/app/answers/detail/a_id/4278"); script_set_attribute(attribute:"solution", value: "Upgrade the NVIDIA graphics driver to version 304.134 / 340.101 / 361.107 / 375.20 (Tesla P100 Series) / 375.26 or later in accordance with the vendor advisory."); script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"); script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_set_attribute(attribute:"vuln_publication_date", value:"2016/12/09"); script_set_attribute(attribute:"patch_publication_date", value:"2016/12/09"); script_set_attribute(attribute:"plugin_publication_date", value:"2016/12/21"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/a:nvidia:gpu_driver"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"Misc."); script_copyright(english:"This script is Copyright (C) 2016-2018 Tenable Network Security, Inc."); script_dependencies("nvidia_unix_driver_detect.nbin"); script_require_keys("NVIDIA_UNIX_Driver/Version"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("misc_func.inc"); version = get_kb_item_or_exit("NVIDIA_UNIX_Driver/Version"); fix = NULL; note = ''; if (version =~ "^375\." && ver_compare(ver:version, fix:"375.26", strict:FALSE) == -1) { fix = "375.26"; note = '\n\nTesla P100 Series has the fix version of 375.20.'; } else if (version =~ "^361\." && ver_compare(ver:version, fix:"361.107", strict:FALSE) == -1) fix = "361.107"; else if (version =~ "^340\." && ver_compare(ver:version, fix:"340.101", strict:FALSE) == -1) fix = "340.101"; else if (version =~ "^304\." && ver_compare(ver:version, fix:"304.134", strict:FALSE) == -1) fix = "304.134"; if(!fix) audit(AUDIT_INST_VER_NOT_VULN, "NVIDIA UNIX Driver", version); report = '\n Installed driver version : ' + version + '\n Fixed driver version : ' + fix; security_report_v4(severity:SECURITY_WARNING, port:0, extra: report+note);
NASL family Ubuntu Local Security Checks NASL id UBUNTU_USN-3173-2.NASL description USN-3173-1 fixed a vulnerability in nvidia-graphics-drivers-304 and nvidia-graphics-drivers-340. This update provides the corresponding update for nvidia-graphics-drivers-375. It was discovered that the NVIDIA graphics drivers contained a flaw in the kernel mode layer. A local attacker could use this issue to cause a denial of service. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 97852 published 2017-03-21 reporter Ubuntu Security Notice (C) 2017-2019 Canonical, Inc. / NASL script (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/97852 title Ubuntu 14.04 LTS / 16.04 LTS / 16.10 : nvidia-graphics-drivers-375 vulnerability (USN-3173-2) code # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Ubuntu Security Notice USN-3173-2. The text # itself is copyright (C) Canonical, Inc. See # <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered # trademark of Canonical, Inc. # include("compat.inc"); if (description) { script_id(97852); script_version("3.5"); script_cvs_date("Date: 2019/09/18 12:31:46"); script_cve_id("CVE-2016-8826"); script_xref(name:"USN", value:"3173-2"); script_name(english:"Ubuntu 14.04 LTS / 16.04 LTS / 16.10 : nvidia-graphics-drivers-375 vulnerability (USN-3173-2)"); script_summary(english:"Checks dpkg output for updated packages."); script_set_attribute( attribute:"synopsis", value: "The remote Ubuntu host is missing one or more security-related patches." ); script_set_attribute( attribute:"description", value: "USN-3173-1 fixed a vulnerability in nvidia-graphics-drivers-304 and nvidia-graphics-drivers-340. This update provides the corresponding update for nvidia-graphics-drivers-375. It was discovered that the NVIDIA graphics drivers contained a flaw in the kernel mode layer. A local attacker could use this issue to cause a denial of service. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues." ); script_set_attribute( attribute:"see_also", value:"https://usn.ubuntu.com/3173-2/" ); script_set_attribute( attribute:"solution", value:"Update the affected nvidia-367 and / or nvidia-375 packages." ); script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"); script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:nvidia-367"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:nvidia-375"); script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:14.04"); script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:16.04"); script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:16.10"); script_set_attribute(attribute:"vuln_publication_date", value:"2016/12/16"); script_set_attribute(attribute:"patch_publication_date", value:"2017/03/20"); script_set_attribute(attribute:"plugin_publication_date", value:"2017/03/21"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"Ubuntu Security Notice (C) 2017-2019 Canonical, Inc. / NASL script (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Ubuntu Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/cpu", "Host/Ubuntu", "Host/Ubuntu/release", "Host/Debian/dpkg-l"); exit(0); } include("audit.inc"); include("ubuntu.inc"); include("misc_func.inc"); if ( ! get_kb_item("Host/local_checks_enabled") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/Ubuntu/release"); if ( isnull(release) ) audit(AUDIT_OS_NOT, "Ubuntu"); release = chomp(release); if (! preg(pattern:"^(14\.04|16\.04|16\.10)$", string:release)) audit(AUDIT_OS_NOT, "Ubuntu 14.04 / 16.04 / 16.10", "Ubuntu " + release); if ( ! get_kb_item("Host/Debian/dpkg-l") ) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Ubuntu", cpu); flag = 0; if (ubuntu_check(osver:"14.04", pkgname:"nvidia-367", pkgver:"375.39-0ubuntu0.14.04.1")) flag++; if (ubuntu_check(osver:"14.04", pkgname:"nvidia-375", pkgver:"375.39-0ubuntu0.14.04.1")) flag++; if (ubuntu_check(osver:"16.04", pkgname:"nvidia-367", pkgver:"375.39-0ubuntu0.16.04.1")) flag++; if (ubuntu_check(osver:"16.04", pkgname:"nvidia-375", pkgver:"375.39-0ubuntu0.16.04.1")) flag++; if (ubuntu_check(osver:"16.10", pkgname:"nvidia-367", pkgver:"375.39-0ubuntu0.16.10.1")) flag++; if (ubuntu_check(osver:"16.10", pkgname:"nvidia-375", pkgver:"375.39-0ubuntu0.16.10.1")) flag++; if (flag) { security_report_v4( port : 0, severity : SECURITY_WARNING, extra : ubuntu_report_get() ); exit(0); } else { tested = ubuntu_pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "nvidia-367 / nvidia-375"); }
NASL family Windows NASL id NVIDIA_WIN_CVE_2016_8826.NASL description The version of the NVIDIA GPU display driver installed on the remote Windows host is 340.x prior to 342.01 or 375.x prior to 376.33. It is, therefore, affected by multiple vulnerabilities : - A flaw exists in the kernel mode layer (nvlddmkm.sys) handler for DxgDdiEscape due to improper access controls. A local attacker can exploit this to access arbitrary memory and thereby gain elevated privileges. (CVE-2016-8821) - A flaw exists in the kernel mode layer (nvlddmkm.sys) handler for DxgDdiEscape IDs 0x600000E, 0x600000F, and 0x6000010 due to improper validation of user-supplied input that is used as an index to an internal array. A local attacker can exploit this to corrupt memory, resulting in a denial of service condition or an escalation of privileges. (CVE-2016-8822) - Multiple buffer overflow conditions exist in the kernel mode layer (nvlddmkm.sys) handler for DxgDdiEscape due to improper validation of an input buffer size. A local attacker can exploit these to cause a denial of service condition or the execution of arbitrary code. (CVE-2016-8823, CVE-2016-8825) - A flaw exists in the kernel mode layer (nvlddmkm.sys) handler for DxgDdiEscape due to improper access controls. A local attacker can exploit this to write to restricted portions of the registry and thereby gain elevated privileges. (CVE-2016-8824) - A flaw exists in the nvlddmkm.sys driver that allows a local attacker to cause GPU interrupt saturation, resulting in a denial of service condition. (CVE-2016-8826) last seen 2020-06-01 modified 2020-06-02 plugin id 96002 published 2016-12-21 reporter This script is Copyright (C) 2016-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/96002 title NVIDIA Windows GPU Display Driver 340.x < 342.01 / 375.x < 376.33 Multiple Vulnerabilities code # # (C) Tenable Network Security, Inc. # include("compat.inc"); if (description) { script_id(96002); script_version("1.6"); script_cvs_date("Date: 2018/11/15 20:50:27"); script_cve_id( "CVE-2016-8821", "CVE-2016-8822", "CVE-2016-8823", "CVE-2016-8824", "CVE-2016-8825", "CVE-2016-8826" ); script_bugtraq_id( 94918, 94956, 94957 ); script_name(english:"NVIDIA Windows GPU Display Driver 340.x < 342.01 / 375.x < 376.33 Multiple Vulnerabilities"); script_summary(english:"Checks the driver version."); script_set_attribute(attribute:"synopsis", value: "A display driver installed on the remote Windows host is affected by multiple vulnerabilities."); script_set_attribute(attribute:"description", value: "The version of the NVIDIA GPU display driver installed on the remote Windows host is 340.x prior to 342.01 or 375.x prior to 376.33. It is, therefore, affected by multiple vulnerabilities : - A flaw exists in the kernel mode layer (nvlddmkm.sys) handler for DxgDdiEscape due to improper access controls. A local attacker can exploit this to access arbitrary memory and thereby gain elevated privileges. (CVE-2016-8821) - A flaw exists in the kernel mode layer (nvlddmkm.sys) handler for DxgDdiEscape IDs 0x600000E, 0x600000F, and 0x6000010 due to improper validation of user-supplied input that is used as an index to an internal array. A local attacker can exploit this to corrupt memory, resulting in a denial of service condition or an escalation of privileges. (CVE-2016-8822) - Multiple buffer overflow conditions exist in the kernel mode layer (nvlddmkm.sys) handler for DxgDdiEscape due to improper validation of an input buffer size. A local attacker can exploit these to cause a denial of service condition or the execution of arbitrary code. (CVE-2016-8823, CVE-2016-8825) - A flaw exists in the kernel mode layer (nvlddmkm.sys) handler for DxgDdiEscape due to improper access controls. A local attacker can exploit this to write to restricted portions of the registry and thereby gain elevated privileges. (CVE-2016-8824) - A flaw exists in the nvlddmkm.sys driver that allows a local attacker to cause GPU interrupt saturation, resulting in a denial of service condition. (CVE-2016-8826)"); script_set_attribute(attribute:"see_also", value:"https://nvidia.custhelp.com/app/answers/detail/a_id/4278"); script_set_attribute(attribute:"solution", value: "Upgrade the NVIDIA graphics driver to version 342.01 / 376.33 or later."); script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"); script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_set_attribute(attribute:"vuln_publication_date", value:"2016/12/09"); script_set_attribute(attribute:"patch_publication_date", value:"2016/12/09"); script_set_attribute(attribute:"plugin_publication_date", value:"2016/12/21"); script_set_attribute(attribute:"plugin_type",value:"local"); script_set_attribute(attribute:"cpe",value:"cpe:/a:nvidia:gpu_driver"); script_set_attribute(attribute:"potential_vulnerability", value:"true"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"Windows"); script_copyright(english:"This script is Copyright (C) 2016-2018 Tenable Network Security, Inc."); script_dependencies("wmi_enum_display_drivers.nbin"); script_require_keys("WMI/DisplayDrivers/NVIDIA", "Settings/ParanoidReport"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("misc_func.inc"); if (report_paranoia < 2) audit(AUDIT_PARANOID); kb_base = 'WMI/DisplayDrivers/'; # double check in case optimization is disabled kbs = get_kb_list(kb_base + '*/Name'); if (isnull(kbs)) exit(0, 'No display drivers were found.'); report = ''; foreach kb (keys(kbs)) { name = kbs[kb]; # only check NVIDIA drivers if ("NVIDIA" >!< name) continue; nvidia_found = TRUE; id = kb - kb_base - '/Name'; version = get_kb_item_or_exit(kb_base + id + '/Version'); driver_date = get_kb_item_or_exit(kb_base + id + '/DriverDate'); disp_driver_date = driver_date; # convert to something we can pass to ver_compare (YYYY.MM.DD) driver_date = split(driver_date, sep:'/', keep:FALSE); driver_date = driver_date[2] + '.' + driver_date[0] + '.' + driver_date[1]; fix = ''; note = ''; # R340 Branch includes 340.x, 341.x, 342.x if (version =~ "^34[012]\." && ver_compare(ver:version, fix:"342.01", strict:FALSE) == -1) { fix = '342.01'; note = 'Only GeForce GPUs with Tesla architecture are affected.'; } # R375 Branch includes 375.x, 376.x if (version =~ "^37[56]\." && ver_compare(ver:version, fix:"376.33", strict:FALSE) == -1) fix = '376.33'; if (!empty(fix)) { order = make_list('Device name','Driver version','Driver date','Fixed version'); report = make_array( order[0],name, order[1],version, order[2],disp_driver_date, order[3],fix ); if (!empty(note)) { report['Note'] = note; order = make_list(order, 'Note'); } report = report_items_str(report_items:report, ordered_fields:order); } } if (!nvidia_found) exit(0, 'No NVIDIA display drivers were found.'); if (!empty(report)) security_report_v4(severity:SECURITY_HOLE, port:0, extra:report); else exit(0, "No vulnerable NVIDIA display drivers were found.");