Everyone Needs To Patch 3 Nvidia Driver Flaws
If your a Business, Gamer or a regular awesome person using the Nivida Chipset you definitely need to patch the Nvidia driver as soon as possible because of the following 3 flaws.
“[The driver] contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape, where the product does not properly synchronize shared data, such as static variables across threads, which can lead to undefined behavior and unpredictable data changes, which may lead to denial of service, escalation of privileges or information disclosure.”
The most severe of the flaws is the CVE‑2019‑5675. This flaw could be used to launch DoS attacks that could cripple the system, as well as give the hackers escalation privileges and disclose system information, from what was said on a Thursday advisory released by Nvidia.
The second flaw, CVE‑2019‑5676, exists in the driver’s software install package and is also rated high-severity. The software actually incorrectly loads Windows system dynamic link libraries (DLLs) without validating their path or signature.
The last vulnerability is the CVE‑2019‑5677 which could lead to a DoS attack. This flaw also exists in the driver’s kernel mode layer (nvlddmkm.sys) handler, for the DeviceIoControl interface. The software in this component “reads from a buffer using buffer-access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer, which may lead to denial of service,”.
You can download recent drivers from this Link: https://www.nvidia.com/Download/index.aspx?lang=en-us
Find out what video card you have.
- Barracuda urges customers to replace Email Security Gateway
- Zero-day vulnerability in the MOVEit file transfer application
- Critical Jetpack Plugin Flaw Addressed in Urgent WordPress Update for Millions of Sites
- Vulnerability With Arris Routers
- Is Your Microsoft Exchange Server Vulnerable to ProxyNotShell Flaw?
Discover more from Patrick Domingues
Subscribe to get the latest posts sent to your email.