Risk | Low |
Patch available | YES |
Number of vulnerabilities | 6 |
CVE-ID | CVE-2016-5852 CVE-2016-4959 CVE-2016-3161 CVE-2016-4961 CVE-2016-5025 CVE-2016-4960 |
CWE-ID | CWE-264 CWE-476 CWE-20 |
Exploitation vector | Local |
Public exploit |
Public exploit code for vulnerability #2 is available. Public exploit code for vulnerability #6 is available. |
Vulnerable software Subscribe |
NVS Client/Desktop applications / Multimedia software Quandro Client/Desktop applications / Multimedia software NVIDIA Windows GPU Display Driver Client/Desktop applications / Virtualization software |
Vendor | nVidia |
Security Bulletin
This security bulletin contains information about 6 vulnerabilities.
Multiple vulnerabilities were discovered in NVDIA drivers, which can lead to system crash and privilege escalation.
EUVDB-ID: #VU760
Risk: Low
CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2016-5852
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a local authenticated user to obtain elevated privileges on the target system.
The vulnerability exists due to improper input validation in GFE GameStream and NVTray Plugin. A local user can bypass security restrictions and obtain elevated privileges on the system.
Successful exploitation of this vulnerability will allow the local attacker to obtain elevated privileges on vulnerable system and cause arbitrary code execution. MitigationNVIDIA has released software updates at the following link: Geforce, NVS, or Quadro
Vulnerable software versionsNVS: 340 - 367
Quandro: 340 - 367
NVIDIA Windows GPU Display Driver: 340 - 367
CPE2.3http://nvidia.custhelp.com/app/answers/detail/a_id/4213/~/security-bulletin%25
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU759
Risk: Low
CVSSv3.1: 5 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C]
CVE-ID: CVE-2016-4959
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a remote user to cause DoS conditions on the target system.
The weakness is caused by improper input validation in Remote Desktop component. Attackers can trigger a blue screen crash and kernel null pointer dereference.
Successful exploitations of the vulnerability may result in denial of service on the vulnerable system.
NVIDIA has released software updates at the following link: Geforce, NVS, or Quadro
Vulnerable software versionsQuandro: 340 - 367
NVIDIA Windows GPU Display Driver: 340 - 367
NVS: 340 - 367
CPE2.3http://nvidia.custhelp.com/app/answers/detail/a_id/4213/~/security-bulletin%25
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU726
Risk: Low
CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2016-3161
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability exists due to improper input validation in GFE GameStream and NVTray Plugin. A local user can bypass security restrictions and obtain elevated privileges on the system.
Successful exploitation of this vulnerability will allow the local attacker to obtain elevated privileges on vulnerable system and compromise the system completely.
NVIDIA has released software updates at the following link: Geforce, NVS, or Quadro
Vulnerable software versionsQuandro: 340 - 367
NVIDIA Windows GPU Display Driver: 340 - 367
NVS: 340 - 367
CPE2.3http://nvidia.custhelp.com/app/answers/detail/a_id/4213/~/security-bulletin%25
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU722
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2016-4961
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local authenticated attacker to trigger DoS conditions on a target system.
The weakness is caused by improper input validation in NVStreamKMS.sys API layer. By impying specially crafted parameters a malicious user can bypass security limitations and crash the vulnerable service.
Successful exploitation of the vulnerability may result in denial of service on the affected system.
Install updates from vendor's website.
Vulnerable software versionsQuandro: 340 - 367
NVIDIA Windows GPU Display Driver: 340 - 367
CPE2.3http://nvidia.custhelp.com/app/answers/detail/a_id/4213/~/security-bulletin%25
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU721
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2016-5025
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local authenticated attacker to trigger DoS conditions on a target system.
The weakness is caused by improper input validation in NVAPI support layer. By impying specially crafted data a malicious user can bypass security limitations and crash the vulnerable service.
Successful exploitation of the vulnerability may result in denial of service on the affected system.
Install updates from vendor's website.
Vulnerable software versionsNVS: 340 - 367
NVIDIA Windows GPU Display Driver: 340 - 367
Quandro: 340 - 367
CPE2.3http://nvidia.custhelp.com/app/answers/detail/a_id/4213/~/security-bulletin%25
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU720
Risk: Medium
CVSSv3.1: 8.2 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:F/RL:O/RC:C]
CVE-ID: CVE-2016-4960
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local authenticated user to obtain elevated privileges.
The vulnerability exists due to improper input validation in NVIDIA NVStreamKMS.sys service component. By implying specially crafted data a local user can bypass security limitations and obtain elevated privileges on the system.
Successful exploitation of this vulnerability will allow the local attacker to obtain elevated privileges on vulnerable system and compromise the system completely.
MitigationInstall updates from vendor's website.
Vulnerable software versionsQuandro: 340 - 367
NVIDIA Windows GPU Display Driver: 340 - 367
NVS: 340 - 367
CPE2.3http://nvidia.custhelp.com/app/answers/detail/a_id/4213/~/security-bulletin%25
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, a fully functional exploit for this vulnerability is available.