NVIDIA confirms three security vulnerabilities in GeForce Experience

Published: 24th Oct 2020, 08:29 GMT   Comments

NVIDIA Security Bulletin

NVIDIA has released a software security update for NVIDIA® GeForce Experience™ software. This update addresses issues that may lead to denial of service, escalation of privileges, code execution, or information disclosure.

To protect your system, download and install this software update from the GeForce Experience Downloads page or open the client to automatically apply the security update.

Details

This section provides a summary of potential vulnerabilities and their impact that this security update addresses. Descriptions use CWE™, and base scores and vectors use CVSS v3.1 standards.

CVE IDsDescriptionBase Score
CVE‑2020‑5977NVIDIA GeForce Experience contains a vulnerability in NVIDIA Web Helper NodeJS Web Server in which an uncontrolled search path is used to load a node module, which may lead to code execution, denial of service, escalation of privileges, and information disclosure.8.2
CVE‑2020‑5990NVIDIA GeForce Experience contains a vulnerability in the ShadowPlay component which may lead to local privilege escalation, code execution, denial of service or information disclosure.7.3
CVE‑2020‑5978NVIDIA GeForce Experience contains a vulnerability in its services in which a folder is created by nvcontainer.exe under normal user login with LOCAL_SYSTEM privileges which may lead to a denial of service or escalation of privileges.3.2

The NVIDIA risk assessment is based on an average of risk across a diverse set of installed systems and may not represent the true risk to your local installation. NVIDIA recommends consulting a security or IT professional to evaluate the risk to your specific configuration.

Security Updates

The following table lists the NVIDIA software products affected, versions affected, and the updated version that includes this security update.

Download the updates from the GeForce Experience Downloads page or open the client to automatically apply the security update.

CVE IDs AddressedSoftware ProductOperating SystemAffected VersionsUpdated Version
CVE‑2020‑5977
CVE‑2020‑5978
CVE‑2020‑5990
GeForce ExperienceWindowsAll versions prior to 3.20.5.703.20.5.70

Mitigations

See Security Updates for the version to install.

Acknowledgements

NVIDIA thanks following individuals for reporting the issues:

  • CVE‑2020‑5977: Xavier DANEST – Decathlon
  • CVE‑2020‑5978: Hashim Jawad of ACTIVELabs
  • CVE‑2020‑5990: Hashim Jawad of ACTIVELabs

The end of NVIDIA Security Bulletin




Comment Policy
  • Comments must be written in English.
  • Comments deemed to be spam or solely promotional in nature will be deleted. Including a link to relevant content is permitted, but comments should be relevant to the post topic.
  • Comments containing language or concepts that could be deemed offensive will be deleted. Note this may include abusive, threatening, pornographic, offensive, misleading or libelous language.
  • A failure to comply with these rules will result in a warning and, in extreme cases, a ban.
  • Please note that comments that attack or harass an individual directly will be deleted and such comments will result in a ban.
  • VideoCardz Moderating Team reserves the right to edit or delete any comments submitted to the site without notice.
  • If you have any questions about the commenting policy, please let us know through the Contact Page.
Hide Comment Policy
Comments