Security Bulletin: NVIDIA Shield TV and Tablet contain multiple vulnerabilities

Answer ID 4548
Updated 09/27/2017 12:40 PM

NVIDIA Shield TV and Tablet vulnerabilities may lead to information disclosure, denial of service or escalation of privileges.

Go to NVIDIA Product Security.


Vulnerability Details

The following sections summarize the vulnerabilities. Descriptions use CWE™ and risk assessments follow CVSS.

CVE-2016-6790

NVIDIA OpenMax Component contains a vulnerability in LIBNVRM where an input buffer is copied to an output buffer without checking the size of the input buffer, which may lead to denial of service.

CVSS Base Score: 9.3
CVSS Temporal Score: 8.4
CVSS Vector: CVSS: 3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C

CVE-2016-6789

NVIDIA OpenMax Component contains a vulnerability in LIBNVOMX.SO where an attacker has the ability to write an arbitrary value to an arbitrary location, which may lead to a possible escalation of privileges.

CVSS Base Score: 9.3
CVSS Temporal Score: 8.4
CVSS Vector: CVSS: 3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C

CVE-2016-8482

NVIDIA Tegra kernel driver contains a vulnerability in NVHOST where referencing memory after it has been freed may lead to denial of service or possible escalation of privileges.

CVSS Base Score: 9.3
CVSS Temporal Score: 8.4
CVSS Vector: CVSS: 3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C

CVE-2016-6777

NVIDIA Tegra kernel driver contains a vulnerability in NVMAP where referencing memory after it has been freed may lead to denial of service or possible escalation of privileges.

CVSS Base Score: 8.4
CVSS Temporal Score: 7.6
CVSS Vector: CVSS: 3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C

CVE-2016-6775

NVIDIA Tegra kernel driver contains a vulnerability in NVMAP where referencing memory after it has been freed may lead to denial of service.

CVSS Base Score: 8.4
CVSS Temporal Score: 7.6
CVSS Vector: CVSS: 3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C

CVE-2016-6776 and CVE-2017-0428

NVIDIA Tegra kernel driver contains a vulnerability in NVHOST where referencing memory after it has been freed may lead to denial of service or possible escalation of privileges.

CVSS Base Score: 8.4
CVSS Temporal Score: 7.6
CVSS Vector: CVSS: 3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C

CVE-2016-2491

NVIDIA Tegra kernel driver contains a vulnerability in NVIDIA camera kernel mode driver where a calculation to determine memory allocation improperly executes and allots less memory than needed causing a buffer overflow, which may lead to denial of service.

CVSS Base Score: 7.7
CVSS Temporal Score: 6.9
CVSS Vector: CVSS: 3.0/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C

CVE-2016-6747

NVIDIA Widevine Crypto Component contains a vulnerability in the MediaServer where the program copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, which may lead to a denial of service.

CVSS Base Score: 7.5
CVSS Temporal Score: 6.7
CVSS Vector: CVSS: 3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C

CVE-2016-8397

NVIDIA Tegra kernel driver contains a vulnerability in NVMAP where uninitialized stack memory may be leaked to the user, which may lead to information disclosure.

CVSS Base Score: 4.3
CVSS Temporal Score: 3.9
CVSS Vector: CVSS: 3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N/E:P/RL:O/RC:C

NVIDIA’s risk assessment is based on an average of risk across a diverse set of installed systems and may not represent the true risk of your local installation. NVIDIA recommends consulting a security or IT professional to evaluate the risk of your specific configuration. NVIDIA doesn’t know of any exploits to these issues at this time.

Affected Products

CVE Product OS
CVE-2016-6790
CVE-2016-6789
CVE-2016-6777
CVE-2016-6775
CVE-2016-6776
CVE-2017-0428
CVE-2016-8482
CVE-2016-2491
CVE-2016-6747
CVE-2016-8397
Shield TV
Shield Tablet
(Versions earlier than SE 5.0)
Android

Fixes

Fixes for Shield are available from Settings>About>System update.

CVE Product OS Fixed Version
CVE-2016-6790
CVE-2016-6789
CVE-2016-6777
CVE-2016-6775
CVE-2016-6776
CVE-2017-0428
CVE-2016-8482
CVE-2016-2491
CVE-2016-6747
CVE-2016-8397
Shield TV Android SE 5.0
Shield Tablet Android SE 5.0

Note: This bulletin describes fixes from older versions of Shield TV and Shield Tablet. Shield TV fixes were released on January 16, 2017 and Shield Tablet fixes were released February 8, 2017. Newer versions are available and these newer versions include the fixes in this bulletin. You are encouraged to download the latest fixed versions of these product lines.

Mitigations

None.

Acknowledgements

None.

Revision History

Revision Date Description
1.0 September 27, 2017 Initial release
Disclaimer

ALL NVIDIA INFORMATION, DESIGN SPECIFICATIONS, REFERENCE BOARDS, FILES, DRAWINGS, DIAGNOSTICS, LISTS, AND OTHER DOCUMENTS (TOGETHER AND SEPARATELY, “MATERIALS”) ARE BEING PROVIDED “AS IS.” NVIDIA MAKES NO WARRANTIES, EXPRESS, IMPLIED, STATUTORY, OR OTHERWISE WITH RESPECT TO THE MATERIALS, AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OR CONDITION OF TITLE, MERCHANTABILITY, SATISFACTORY QUALITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT, ARE HEREBY EXCLUDED TO THE MAXIMUM EXTENT PERMITTED BY LAW.

Information furnished is believed to be accurate and reliable. However, NVIDIA Corporation assumes no responsibility for the consequences of use of such information or for any infringement of patents or other rights of third parties that may result from its use. No license is granted by implication or otherwise under any patent or patent rights of NVIDIA Corporation. Specifications mentioned in this publication are subject to change without notice. This publication supersedes and replaces all information previously supplied. NVIDIA Corporation products are not authorized for use as critical components in life support devices or systems without express written approval of NVIDIA Corporation.

Was this answer helpful?
Your rating has been submitted, please tell us how we can make this answer more useful.

LIVE CHAT

Chat online with one of our support agents

CHAT NOW

ASK US A QUESTION

Contact Support for assistance

CONTACT US