Wednesday, December 26th 2012
Does NVIDIA Display Driver Service Make Your System Vulnerable?
An [ethical?] hacker going by the Twitter handle @peterwintrsmith discovered a gaping security hole in NVIDIA's display driver service that allows ordinary local and remote users to gain administrator privileges in Windows. Mr. Winter-Smith posted a description and details of the exploit, in which he describes the NVIDIA Display Device server (NVVSVC) as listening on a pipe (a means by which different processes talk to each other) "\pipe\nsvr," which has an null/empty discretionary access control list (DACL, a security whitelist for users/groups), letting ordinary logged in local and remote users (firewall permitting, and the remote admin has a local account) to gain administrator rights to the system. In our opinion, the exploit is plausible, and could cut short winter breaks of a few in Santa Clara.
Source:
TechPowerUp Forums
23 Comments on Does NVIDIA Display Driver Service Make Your System Vulnerable?
Just kidding. It's a joke. Get it?
- The attacker mush know the username and password of an active local user account on the machine.
- The firewall has to allow traffic in through whatever port the service is listening on.
You'd have to have a pretty shitty security setup already for this vulnerability to really affect you.2) Get the current username via code (very easy)
3) Run the exploit, BAM admin
4) Do evil things(tm)
Torrents........that's a different story.
AMD FANBOI :laugh:
www.techpowerup.com/177540/AMD-to-Get-Rid-of-Catalyst-Auto-Update-Feature-in-2013-Cites-Security-Concerns.html
In this day and age someone is still running a Windows system without a firewall/router?
In this case never mind the Nvidia/ATI shitty drivers, he is already a zombie (botnet).
FUD is generally a strategic attempt to influence perception by disseminating negative and dubious or false information. An individual firm, for example, might use FUD to invite unfavorable opinions and speculation about a competitor's product; to increase the general estimation of switching costs among current customers; or to maintain leverage over a current business partner who could potentially become a rival.
The term originated to describe disinformation tactics in the computer hardware industry but has since been used more broadly.
Wait
And browser hijack redirects.
I'm growing a beard™, so I am safe.
" with "relaxed firewall rules" and file sharing enabled.
Oh noes!
And if a commercial network already has infiltration to the backdoor level *as is required for this to be an issue* then who cares, you're in trouble already.
Sounds like this guy is turning a molehill into a mountain just to get some press. A) Hosts files
B) Don't visit shady websites/open shady email attachments
C) Take control/concern with your Active X and Java
D) All remote registry services disabled (until the time of requirement/access needed)
Statistically impossible for you to get a blown virus. About the worst you may encounter is a sneaky bit of malware that slipped in through browser controls and all it does is snoop or redirect you to paysites.
www.geforce.com/drivers/results/55026