NVIDIA Display Driver Service Remote Stack Buffer Overflow (credentialed check)

This script is Copyright (C) 2013-2014 Tenable Network Security, Inc.


Synopsis :

A network service running on the remote host has a stack-based buffer
overflow vulnerability.

Description :

The NVIDIA Display Driver Service running on the remote Windows host
has a remote stack-based buffer overflow. The vulnerability can be
exploited by connecting to the nsvr named pipe and making a specially
crafted request.

A remote, authenticated attacker could exploit this to execute
arbitrary code as SYSTEM.

See also :

http://archives.neohapsis.com/archives/dailydave/2013-q1/0007.html
http://www.nessus.org/u?3cbe2c67
http://nvidia.custhelp.com/app/answers/detail/a_id/3288
http://www.geforce.com/drivers/results/55026
http://www.geforce.com/drivers/results/55121
http://www.geforce.com/drivers/results/55217
http://www.geforce.com/drivers/results/55220
http://www.geforce.com/drivers/results/55599

Solution :

Upgrade to NVIDIA graphics drivers version 310.90 or later.

Risk factor :

High / CVSS Base Score : 9.0
(CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C)
CVSS Temporal Score : 8.5
(CVSS2#E:F/RL:U/RC:ND)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 63417 ()

Bugtraq ID: 57123

CVE ID: CVE-2013-0109