Vulnerabilities > CVE-2017-0343 - Race Condition vulnerability in Nvidia GPU Driver
Attack vector
LOCAL Attack complexity
HIGH Privileges required
LOW Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
All versions of the NVIDIA Windows GPU Display Driver contain a vulnerability in the kernel mode layer (nvlddmkm.sys) where user can trigger a race condition due to lack of synchronization in two functions leading to a denial of service or potential escalation of privileges.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 | |
OS | 1 |
Common Weakness Enumeration (CWE)
Common Attack Pattern Enumeration and Classification (CAPEC)
- Leveraging Race Conditions This attack targets a race condition occurring when multiple processes access and manipulate the same resource concurrently and the outcome of the execution depends on the particular order in which the access takes place. The attacker can leverage a race condition by "running the race", modifying the resource and modifying the normal execution flow. For instance a race condition can occur while accessing a file, the attacker can trick the system by replacing the original file with his version and cause the system to read the malicious file.
- Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions This attack targets a race condition occurring between the time of check (state) for a resource and the time of use of a resource. The typical example is the file access. The attacker can leverage a file access race condition by "running the race", meaning that he would modify the resource between the first time the target program accesses the file and the time the target program uses the file. During that period of time, the attacker could do something such as replace the file and cause an escalation of privilege.
Nessus
NASL family | Windows |
NASL id | NVIDIA_WIN_CVE_2017_0355.NASL |
description | The version of the NVIDIA GPU display driver installed on the remote Windows host is 375.x prior to 377.35 or 382.x prior to 382.05. It is, therefore, affected by multiple vulnerabilities : - An uninitialized pointer flaw exists in the kernel mode layer (nvlddmkm.sys) handler for DxgDdiEscape due to improper validation of user-supplied input. A local attacker can exploit this to cause a denial of service condition or potentially to gain elevated privileges. (CVE-2017-0341) - An out-of-bounds access error exists in the kernel mode layer (nvlddmkm.sys) handler due to certain incorrect calculations. A local attacker can exploit this to cause a denial of service condition or potentially to gain elevated privileges. (CVE-2017-0342) - A race condition exists in the kernel mode layer (nvlddmkm.sys) handler due to improper synchronization of certain functions. A local attacker can exploit this to cause a denial of service condition or potentially to gain elevated privileges. (CVE-2017-0343) - An unspecified flaw exists in the kernel mode layer (nvlddmkm.sys) handler for DxgDdiEscape that allows a local attacker to access arbitrary physical memory and gain elevated privileges. (CVE-2017-0344) - An out-of-bounds access error exists in the kernel mode layer (nvlddmkm.sys) handler for DxgDdiEscape due to improper validation of user-supplied array size input. A local attacker can exploit this to cause a denial of service condition or potentially to gain elevated privileges. (CVE-2017-0345) - A buffer overflow condition exists in the kernel mode layer (nvlddmkm.sys) handler for DxgDdiEscape due to improper validation of user-supplied input. A local attacker can exploit this to cause a denial of service condition or potentially to gain elevated privileges. (CVE-2017-0346) - An array-indexing error exists in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape due to improper validation of user-supplied input. A local attacker can exploit this to cause a denial of service condition or potentially to gain elevated privileges. (CVE-2017-0347) - A NULL pointer dereference flaw exists in the kernel mode layer (nvlddmkm.sys) handler due to improper validation of user-supplied input. A local attacker can exploit this to cause a denial of service condition or potentially to gain elevated privileges. (CVE-2017-0348) - An invalid pointer flaw exists in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape due to improper validation of a user-supplied pointer before it is dereferenced for a write operation. A local attacker can exploit this to cause a denial of service condition or potentially to gain elevated privileges. (CVE-2017-0349) - A flaw exists in the kernel mode layer handler for DxgDdiEscape due to the driver improperly locking on certain conditions. A local attacker can exploit this to cause a denial of service condition. (CVE-2017-0353) - A flaw exists in the kernel mode layer handler for DxgkDdiEscape where a call to certain functions requiring lower IRQL can be made under raised IRQL. A local attacker can exploit this to cause a denial of service condition. (CVE-2017-0354) - A flaw exists in the kernel mode layer handler for DxgkDdiEscape due to accessing paged memory while holding a spin lock. A local attacker can exploit this to cause a denial of service condition. (CVE-2017-0355) |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 100259 |
published | 2017-05-17 |
reporter | This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/100259 |
title | NVIDIA Windows GPU Display Driver 375.x < 377.35 / 382.x < 382.05 Multiple Vulnerabilities |
code |
|