A Bit About the NVIDIA Vulnerability
Geoff writes in this morning asking for more eploration around the Nvidia vulnerability patch that was released yesterday. (http://www.securityweek.com/nvidia-releases-fix-dangerous-display-driver-exploit)
He writes: "Its really quiet if it is truly a vulnerability patch. I don't see any reference to an exploit fix. Maybe you can dig deeper and confirm?"
On December 25th, 2012, a security research released exploit code that leverages a buffer overflow vulnerability in versions prior to 310.90 of the GeForce Driver for a popular line of NVIDIA video cards. This is a privilege escalation exploit that allows someone with low-level access to gain administrative-privileges on that system.
Since it requires access to the target system before it is effective, there isn't as much press about it as you might expect. However, in our current world where uses can be expected to click on just about anything, gaining that access isn't as hard as some might expect or want.
It's been less than two weeks between the public release of the code and a patch, and there were a couple of holidays within those two weeks, so I'd give NVIDA points for their response time. As for how serious I think it is? I'm downloading the patch as I write this up.
-KL
Comments
But well, if you've made it that far I guess there are far more vulnerabilities than just the graphics driver, which also won't be nvidia in many companies.
Update is still recommended of course, yet the nvidia server crashes to 0 kb/s after 1 sec of transferring. **** that :D
Kugelfisch
Jan 6th 2013
1 decade ago
http://www.anandtech.com/show/6408/nvidia-releases-31033-beta-drivers-geforce-6-7-series-moved-to-legacy-status
hanzzon
Jan 6th 2013
1 decade ago
Adam
Jan 6th 2013
1 decade ago
BigHoss
Jan 7th 2013
1 decade ago
GJ
Jan 7th 2013
1 decade ago