NVIDIA Virtual GPU Manager Multiple Vulnerabilities (February 2024)

high Nessus Plugin ID 191743

Synopsis

A GPU virtualization application installed on the remote host is affected by multiple vulnerabilities.

Description

The NVIDIA Virtual GPU Manager software on the remote host is missing a security update. It is, therefore, affected by multiple vulnerabilities, including the following:

- NVIDIA GPU Display Driver for WIndows and Linux contains a vulnerability in the kernel mode data handler, where an unprivileged regular user can cause integer overflow, which may lead to denial of service, information disclosure, and data tampering. (CVE-2022-42665)

- NVIDIA GPU Display Driver for Linux contains a vulnerability where an attacker may access a memory location after the end of the buffer. A successful exploit of this vulnerability may lead to denial of service and data tampering. (CVE-2024-0074)

- NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability where a user may cause a NULL-pointer dereference by accessing passed parameters the validity of which has not been checked. A successful exploit of this vulnerability may lead to denial of service and limited information disclosure. (CVE-2024-0075)

- NVIDIA Virtual GPU Manager contains a vulnerability in the vGPU plugin, where it allows a guest OS to allocate resources for which the guest OS is not authorized. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering. (CVE-2024-0077)

- NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer, where a user in a guest can cause a NULL-pointer dereference in the host, which may lead to denial of service. (CVE-2024-0078)

- NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer, where a user in a guest VM can cause a NULL-pointer dereference in the host. A successful exploit of this vulnerability may lead to denial of service. (CVE-2024-0079) Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade the NVIDIA vGPU Manager software in accordance with the vendor advisory.

See Also

http://www.nessus.org/u?20b94e14

Plugin Details

Severity: High

ID: 191743

File Name: nvidia_vgpu_2024_2.nasl

Version: 1.3

Type: local

Family: Misc.

Published: 3/8/2024

Updated: 3/28/2024

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2024-0077

CVSS v3

Risk Factor: High

Base Score: 7.1

Temporal Score: 6.2

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

CVSS Score Source: CVE-2022-42265

Vulnerability Information

CPE: cpe:/a:nvidia:virtual_gpu_manager

Required KB Items: installed_sw/NVIDIA Virtual GPU Manager

Exploit Ease: No known exploits are available

Patch Publication Date: 2/26/2024

Vulnerability Publication Date: 2/28/2024

Reference Information

CVE: CVE-2022-42265, CVE-2024-0074, CVE-2024-0075, CVE-2024-0077, CVE-2024-0078, CVE-2024-0079

IAVA: 2024-A-0130