Security Bulletin: NVIDIA GPU Display Driver contains multiple vulnerabilities in the kernel mode layer handler

Answer ID 4398
Updated 05/15/2017 10:44 AM

NVIDIA GPU Display Driver vulnerabilities in the kernel layer handler may lead to denial of service or escalation of privilege


Go to NVIDIA Product Security.


Vulnerability Details

The following sections summarize the vulnerabilities and list their CVSS risk assessments.

CVE-2017-0308

NVIDIA Windows GPU Display Driver contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape where untrusted input used for buffer size calculation may lead to a denial of service or escalation of privileges.

CVSS Base Score: 8.8
CVSS Temporal Score: 7.9
CVSS Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C

CVE-2017-0309

NVIDIA GPU Display Driver contains a vulnerability in the kernel mode layer handler where multiple integer overflows may cause improper memory allocation, which may lead to a denial of service or potential escalation of privileges.

CVSS Base Score: 8.8
CVSS Temporal Score: 7.9
CVSS Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C

CVE-2017-0311

NVIDIA GPU Display Driver contains a vulnerability in the kernel mode layer handler where improper access control may lead to a denial of service or possible escalation of privileges.

CVSS Base Score: 8.8
CVSS Temporal Score: 7.9
CVSS Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C

CVE-2017-0312

NVIDIA Windows GPU Display Driver contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscapeID 0x100008b where user-provided input used as the limit for a loop may lead to a denial of service or potential escalation of privileges.

CVSS Base Score: 8.8
CVSS Temporal Score: 7.9
CVSS Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C

CVE-2017-0313

NVIDIA Windows GPU Display Driver contains a vulnerability in the kernel mode layer (nvlddmkm.sys) implementation of the SubmitCommandVirtual DDI (DxgkDdiSubmitCommandVirtual) function where untrusted input used to reference memory outside of the intended boundary of the buffer may lead to a denial of service or escalation of privileges.

CVSS Base Score: 8.8
CVSS Temporal Score: 7.9
CVSS Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C

CVE-2017-0314

NVIDIA Windows GPU Display Driver contains a vulnerability in the kernel mode layer (nvlddmkm.sys) implementation of the SubmitCommandVirtual DDI (DxgkDdiSubmitCommandVirtual) function where untrusted input used to reference memory outside of the intended boundary of the buffer may lead to a denial of service or escalation of privileges.

CVSS Base Score: 8.8
CVSS Temporal Score: 7.9
CVSS Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C

CVE-2017-0315

NVIDIA Windows GPU Display Driver contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape where an attempt to access an invalid object pointer may lead to a denial of service or potential escalation of privileges.

CVSS Base Score: 8.8
CVSS Temporal Score: 7.9
CVSS Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C

CVE-2017-0321

NVIDIA GPU Display Driver contains a vulnerability in the kernel mode layer handler where a NULL pointer dereference caused by invalid user input may lead to a denial of service or potential escalation of privileges.

CVSS Base Score: 8.8
CVSS Temporal Score: 7.9
CVSS Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C

CVE-2017-0322

NVIDIA Windows GPU Display Driver contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler where a value passed from a user to the driver is not correctly validated and used as the index to an array, which may lead to a denial of service or potential escalation of privileges.

CVSS Base Score: 8.8
CVSS Temporal Score: 7.9
CVSS Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C

CVE-2017-0323

NVIDIA Windows GPU Display Driver contains a vulnerability in the kernel mode layer handler where a NULL pointer dereference caused by invalid user input may lead to a denial of service or potential escalation of privileges.

CVSS Base Score: 8.8
CVSS Temporal Score: 7.9
CVSS Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C

CVE-2017-0324

NVIDIA Windows GPU Display Driver contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape where the size of an input buffer is not validated, which may lead to a denial of service or potential escalation of privileges.

CVSS Base Score: 8.8
CVSS Temporal Score: 7.9
CVSS Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C

CVE-2017-0317

NVIDIA GPU and GeForce Experience installer contains a vulnerability where it fails to set proper permissions on the package extraction path, allowing a non-privileged user to tamper with the extracted files, potentially leading to escalation of privileges through code execution.

CVSS Base Score: 7.5
CVSS Temporal Score: 6.5
CVSS Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C

CVE-2017-0318

NVIDIA Linux GPU Display Driver contains a vulnerability in the kernel mode layer handler where improper validation of an input parameter may cause a denial of service on the system.

CVSS Base Score: 6.5
CVSS Temporal Score: 5.9
CVSS Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:P/RL:O/RC:C

CVE-2017-0310

NVIDIA GPU Display Driver contains a vulnerability in the kernel mode layer handler where improper access controls allow an unprivileged user to cause a denial of service.

CVSS Base Score: 6.5
CVSS Temporal Score: 5.9
CVSS Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:P/RL:O/RC:C

CVE-2017-0319

NVIDIA Windows GPU Display Driver contains a vulnerability in the kernel mode layer handler where improper handling of values may cause a denial of service on the system.

CVSS Base Score: 5.6
CVSS Temporal Score: 5.1
CVSS Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H/E:P/RL:O/RC:C

CVE-2017-0320

NVIDIA Windows GPU Display Driver contains a vulnerability in the kernel mode layer handler where improper handling of values may cause a denial of service on the system.

CVSS Base Score: 5.6
CVSS Temporal Score: 5.1
CVSS Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H/E:P/RL:O/RC:C

NVIDIA’s risk assessment is based on an average of risk across a diverse set of installed systems and may not represent the true risk of your local installation. NVIDIA recommends consulting a local security or IT professional to evaluate the risk of your specific configuration. NVIDIA doesn’t know of any exploits to these issues at this time.

Affected Products

CVE Product Impacted Installed Component OS
CVE-2017-0308
CVE-2017-0312
CVE-2017-0313
CVE-2017-0314
CVE-2017-0315
CVE-2017-0317
CVE-2017-0319
CVE-2017-0320
CVE-2017-0322
CVE-2017-0323
CVE-2017-0324
GeForce
NVS
Quadro
Tesla
Graphics Driver Windows
CVE-2017-0309
CVE-2017-0310
CVE-2017-0311
CVE-2017-0321
GeForce
NVS
Quadro
Tesla
Graphics Driver Windows, Linux, FreeBSD, and Solaris
CVE-2017-0318 GeForce
NVS
Quadro
Tesla
Graphics Driver Linux, FreeBSD, and Solaris

Fixes

Windows

Product Product Series OS Driver Branch 1st Version Including the Fix
GeForce All Windows R378 378.52
NVS
Quadro
All Windows R378 378.52
R375 376.67
Tesla All Windows R375 376.84
GRID GRID Series Windows R352 GRID Software 2.5
356.60
R361 GRID Software 3.4
363.36

Linux

Product Product Series OS Driver Branch 1st Version Including the Fix
GeForce
Quadro
NVS
All Linux, FreeBSD, and Solaris R378 378.13
R375 375. 39
R340 340.102
R304 304.135
Tesla All Linux R375 375.39
R361 361.119
GRID GRID vGPU Linux, FreeBSD, and Solaris R352 GRID Software 2.5
352.103
R361 GRID Software 3.4
361.45.48

Mitigations

None.

Acknowledgements

CVE-2017-0312 and CVE-2017-0313: NVIDIA was informed of this issue by Oliver Chang working with Google Project Zero.

CVE-2017-0317: NVIDIA was informed of this issue by Ryan Whitworth.

Revision History

Revision Date Description
4.0 April 4, 2017 Added information about fixes available for affected NVIDIA GRID products
3.0 March 9, 2017 Added information about fixes available for affected NVIDIA GRID products
2.0 February 16, 2017 Added the first version including the fix for Tesla drivers in the R375 branch
1.0 February 14, 2017 Initial release

Frequently Asked Questions (FAQs)

How do I know what driver version I have installed?

  1. Launch Windows Device Manager.
  2. Select Display Adapters.
  3. Select the NVIDIA GPU node and right-click.
  4. Go to the Driver tab.

The driver version can be deciphered as shown in the following examples: 10.18.13.6472 is 364.72 and 10.18.13.472 is 304.72

Disclaimer

ALL NVIDIA INFORMATION, DESIGN SPECIFICATIONS, REFERENCE BOARDS, FILES, DRAWINGS, DIAGNOSTICS, LISTS, AND OTHER DOCUMENTS (TOGETHER AND SEPARATELY, “MATERIALS”) ARE BEING PROVIDED “AS IS.” NVIDIA MAKES NO WARRANTIES, EXPRESS, IMPLIED, STATUTORY, OR OTHERWISE WITH RESPECT TO THE MATERIALS, AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OR CONDITION OF TITLE, MERCHANTABILITY, SATISFACTORY QUALITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT, ARE HEREBY EXCLUDED TO THE MAXIMUM EXTENT PERMITTED BY LAW.

Information furnished is believed to be accurate and reliable. However, NVIDIA Corporation assumes no responsibility for the consequences of use of such information or for any infringement of patents or other rights of third parties that may result from its use. No license is granted by implication or otherwise under any patent or patent rights of NVIDIA Corporation. Specifications mentioned in this publication are subject to change without notice. This publication supersedes and replaces all information previously supplied. NVIDIA Corporation products are not authorized for use as critical components in life support devices or systems without express written approval of NVIDIA Corporation.

Was this answer helpful?
Your rating has been submitted, please tell us how we can make this answer more useful.

LIVE CHAT

Chat online with one of our support agents

CHAT NOW

ASK US A QUESTION

Contact Support for assistance

CONTACT US