Los controladores Nvidia GeForce 419.17 escondían resolver 8 vulnerabilidades críticas del sistema

El 22 de febrero se lanzaron los controladores Nvidia GeForce 419.17 WHQL, pero es hoy cuando sabemos que estos controladores incluían parches de seguridad de gran importancia tanto en su versión de Windows como Linux.

Si no cuentas con dichos controladores ya instalados, tu equipo es propenso a recibir ataques de denegación del servicio (DDoS), acceso a nuestro sistema con escalado de privilegios, ejecución de código malicioso, y acceso a nuestra información privada.

Nvidia GeForce RTX 740x353 0

La lista completa de los problemas de seguridad resueltos se puede ver en la tabla que proporcionó la compañía. Cada vulnerabilidad de seguridad tiene una puntuación asociada que básicamente equivale a una calificación de amenaza. 7 de las 8 vulnerabilidades supera la calificación de 5, por lo que son serios problemas de vulnerabilidad ligados a la ejecución de código malicioso y escalado de privilegios.

El mayor de los problemas, es que Nvidia haya dado a conocer la información tan tarde, por lo que se recomienda a todos los usuarios que instalen dicha actualización para que su sistema permanezca completamente seguro.

CVEDescripciónNivelCVSS V3 Vector
CVE 2019 5665NVIDIA Windows GPU Display driver contains a vulnerability in the 3D vision component in which the stereo service software, when opening a file, does not check for hard links. This behavior may lead to code execution, denial of service or escalation of privileges.8.8AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
CVE 2019 5666NVIDIA Windows GPU Display Driver contains a vulnerability in the kernel mode layer (nvlddmkm.sys) create context command DDI DxgkDdiCreateContext in which the product uses untrusted input when calculating or using an array index, but the product does not validate or incorrectly validates the index to ensure the index references a valid position within the array, which may lead to denial of service or escalation of privileges.8.8AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
CVE 2019 5667NVIDIA Windows GPU Display Driver contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiSetRootPageTable in which the application dereferences a pointer that it expects to be valid, but is NULL, which may lead to code execution, denial of service or escalation of privileges.8.8AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
CVE 2019 5668NVIDIA Windows GPU Display Driver contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiSubmitCommandVirtual in which the application dereferences a pointer that it expects to be valid, but is NULL, which may lead to denial of service or escalation of privileges.8.8AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
CVE 2019 5669NVIDIA Windows GPU Display Driver contains a vulnerability in the kernel mode layer handler for DxgkDdiEscape in which the software uses a sequential operation to read from or write to a buffer, but it uses an incorrect length value that causes it to access memory that is outside of the bounds of the buffer, which may lead to denial of service or escalation of privileges.8.8AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
CVE 2019 5670NVIDIA Windows GPU Display Driver contains a vulnerability in the kernel mode layer handler for DxgkDdiEscape in which the software uses a sequential operation to read from or write to a buffer, but it uses an incorrect length value that causes it to access memory that is outside of the bounds of the buffer which may lead to denial of service, escalation of privileges, code execution or information disclosure.7.8AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE 2019 5671NVIDIA Windows GPU Display Driver contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape in which the software does not release a resource after its effective lifetime has ended, which may lead to denial of service.6.5AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
CVE 2018 6260NVIDIA graphics driver contains a vulnerability that may allow access to application data processed on the GPU through a side channel exposed by the GPU performance counters. Local user access is required. This vulnerability is not a network or remote attack vector.2.2AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N

Artículos relacionados