NEWS - December 28, 2012
by Carol~ - 12/28/12 11:02 AM
Nvidia Display Driver Service Attack Escalates Privileges on Windows Machines
There's nothing like a zero-day to ruin the holiday break, but that's just what may be in store for engineers at Nvidia after a researcher discovered a new vulnerability in the Nvidia Display Driver Service. The flaw could hand over administrator privileges on Windows machines to an attacker.
Peter Winter-Smith, formerly with the NGS Software of the U.K., posted details of the vulnerability and exploit to Pastebin. In it, he explains that the service is vulnerable to a stack buffer overflow that bypasses data execution prevention (DEP) and address space layout randomization (ASLR) running in the Windows operating system since Windows Vista.
"The service listens on a named pipe (\pipe\nsvr) which has a NULL DACL configured, which should mean that any logged on user or remote user in a domain context (Windows firewall/file sharing permitting) should be able to exploit this vulnerability," Winter-Smith wrote on Pastebin. "The buffer overflow occurs as a result of a bad memmove operation."
Continued : https://threatpost.com/en_us/blogs/nvidia-display-driver-service-attack-escalates-privileges-windows-machines-122712
Flaw in Nvidia Driver Allows for Remote Injection of Unwanted Super-User
Researcher Unwraps Dangerous NVIDIA Driver Exploit on Christmas Day