Security Bulletin: Multiple vulnerabilities affect Quadro, NVS, and GeForce Windows based systems (CVE-2016-4959, CVE-2016-3161, CVE-2016-5852, CVE-2016-4960, CVE-2016-5025, CVE-2016-4961)
CVE-2016-4959
Description: Remote Desktop denial of service. A successful exploit of a vulnerable system will result in a kernel null pointer dereference, causing a blue screen crash.
CVSS Base Score: 7.8
CVSS Temporal Score: 6.1
CVSS Environmental Score: [determined by user]
CVSS V2 Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:C/E:POC/RL:OF/RC:C)
CVE-2016-3161 and CVE-2016-5852
Description: GFE GameStream and NVTray Plugin unquoted service path vulnerabilities are examples of the unquoted service path vulnerability in Windows. A successful exploit of a vulnerable service installation can enable malicious code to execute on the system at the system/user privilege level.
CVSS Base Score: 6.8
CVSS Temporal Score: 5
CVSS Environmental Score: [determined by user]
CVSS V2 Vector: (AV:L/AC:L/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C)
CVE-2016-4960
Description: The NVIDIA NVStreamKMS.sys service component is improperly validating user-supplied data through its API entry points causing an elevation of privilege.
CVSS Base Score: 6.6
CVSS Temporal Score: 5.5
CVSS Environmental Score: [determined by user]
CVSS V2 Vector: (AV:L/AC:M/Au:S/C:C/I:C/A:C/E:F/RL:OF/RC:C)
CVE-2016-5025
Description: Improper sanitization of parameters in the NVAPI support layer causes a denial of service vulnerability (blue screen crash) within the NVIDIA Windows graphics drivers.
CVSS Base Score: 5.7
CVSS Temporal Score: 4.5
CVSS Environmental Score: [determined by user]
CVSS V2 Vector: (AV:L/AC:L/Au:S/C:P/I:P/A:C/E:POC/RL:OF/RC:C)
CVE-2016-4961
Description: Improper sanitization of parameters in the NVStreamKMS.sys API layer caused a denial of service vulnerability (blue screen crash) within the NVIDIA Windows graphics drivers.
CVSS Base Score: 4.6
CVSS Temporal Score: 3.8
CVSS Environmental Score: [determined by user]
CVSS V2 Vector: (AV:L/AC:L/Au:S/C:N/I:N/A:C/E:F/RL:OF/RC:C)
NVIDIAโs risk assessment is based on an average of risk across a diverse set of installed systems and may not represent the true risk of your local installation. We recommended consulting a local security or IT professional to evaluate the risk of your specific configuration. NVIDIA doesnโt know of any exploits to these issues at this time.