Vigil@nce - NVIDIA: privilege escalation via IOCTL
November 2015 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
A local attacker can generate a memory corruption with an IOCTL of
NVIDIA, in order to trigger a denial of service, and possibly to
run code.
– Impacted products: Windows (platform) not comprehensive, Ubuntu,
Unix (platform) not comprehensive.
– Severity: 2/4.
– Creation date: 29/09/2015.
DESCRIPTION OF THE VULNERABILITY
The NVIDIA driver runs with system privileges.
Local users interact with this driver using IOCTLs. However, using
a malicious IOCTL, an attacker can write 32 bits in kernel memory.
A local attacker can therefore generate a memory corruption with
an IOCTL of NVIDIA, in order to trigger a denial of service, and
possibly to run code.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/NVIDIA-privilege-escalation-via-IOCTL-17994