NVIDIA GeForce Experience, all versions prior to 3.20.0.118, contains a vulnerability when GameStream is enabled in which an attacker with local system access can load the Intel graphics driver DLLs without validating the path or signature (also known as a binary planting or DLL preloading attack), which may lead to denial of service, information disclosure, or escalation of privileges through code execution.
References
Link | Resource |
---|---|
https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-011.md | Third Party Advisory |
https://nvidia.custhelp.com/app/answers/detail/a_id/4860 | Patch Vendor Advisory |
https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-011.md | Third Party Advisory |
https://nvidia.custhelp.com/app/answers/detail/a_id/4860 | Patch Vendor Advisory |
Configurations
History
21 Nov 2024, 04:45
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-011.md - Third Party Advisory | |
References | () https://nvidia.custhelp.com/app/answers/detail/a_id/4860 - Patch, Vendor Advisory |
Information
Published : 2019-11-09 02:15
Updated : 2024-11-21 04:45
NVD link : CVE-2019-5701
Mitre link : CVE-2019-5701
CVE.ORG link : CVE-2019-5701
JSON object : View
Products Affected
nvidia
- geforce_experience
CWE
CWE-427
Uncontrolled Search Path Element