NVIDIA Display Driver Service Remote Stack Buffer Overflow (credentialed check)

This script is Copyright (C) 2013-2015 Tenable Network Security, Inc.


Synopsis :

A video display service on the remote Windows host is affected by a
stack-based buffer overflow vulnerability.

Description :

The NVIDIA Display Driver Service on the remote Windows host is
affected by a remote stack-based buffer overflow. An authenticated,
remote attacker, by connecting to the nsvr named pipe and making a
specially crafted request, could exploit this to execute arbitrary
code as SYSTEM.

See also :

http://archives.neohapsis.com/archives/dailydave/2013-q1/0007.html
http://www.geforce.com/drivers/results/55026
http://www.geforce.com/drivers/results/55121
http://www.geforce.com/drivers/results/55217
http://www.geforce.com/drivers/results/55220
http://www.geforce.com/drivers/results/55599
http://www.nvidia.com/download/driverResults.aspx/56056

Solution :

Upgrade to NVIDIA graphics drivers version 307.74 / 310.90 or later.

Risk factor :

High / CVSS Base Score : 9.0
(CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C)
CVSS Temporal Score : 8.5
(CVSS2#E:F/RL:U/RC:ND)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 63417 ()

Bugtraq ID: 57123

CVE ID: