❌

Normal view

There are new articles available, click to refresh the page.
Before yesterdayCisco Talos

Vulnerability Spotlight: NVIDIA driver memory corruption vulnerabilities discovered

6 December 2022 at 16:09
Vulnerability Spotlight: NVIDIA driver memory corruption vulnerabilities discovered

Piotr Bania of Cisco Talos discovered these vulnerabilities.

Cisco Talos recently discovered two memory corruption vulnerabilities in shader functionality of an NVIDIA driver.

NVIDIA Graphics drivers are software for NVIDIA Graphics GPU installed on the PC. They are used to communicate between the operating system and the GPU device. This software is required in most cases for the hardware device to function properly.

Two exploitable memory corruption vulnerabilities exist in the NVIDIA graphics driver: TALOS-2022-1603 (CVE-2022-34671) and TALOS-2022-1604 (CVE-2022-34671). An attacker can use a malicious shader file to trigger these vulnerabilities. These vulnerabilities could also potentially be triggered from guest operating systems running in virtualization environments (ie. VMware, qemu, VirtualBox, etc.) and can lead to so-called guest-to-host escape.

Cisco Talos worked with NVIDIA to ensure that these issues were resolved and an update is available for affected customers, all in adherence to Cisco’s vulnerability disclosure policy.

Users are encouraged to update this affected product as soon as possible: NVIDIA D3D10 Driver, Version 516.94 , 31.0.15.1694. Talos tested and confirmed this version of the NVIDIA could be exploited by these vulnerabilities.

The following Snort rules will detect exploitation attempts against these vulnerabilities: 60606-60607 and 60611-60612. Additional rules may be released in the future and current rules are subject to change, pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

Yesterday β€” 7 December 2022Cisco Talos

Vulnerability Spotlight: Memory corruption vulnerability discovered in PowerISO

7 December 2022 at 18:50
Vulnerability Spotlight: Memory corruption vulnerability discovered in PowerISO

Piotr Bania of Cisco Talos discovered this vulnerability.

Cisco Talos recently discovered a memory corruption vulnerability in PowerISO.

TALOS-2022-1644 (CVE-2022-41992) is a memory corruption vulnerability that exists in the VHD File Format parsing functionality of PowerISO 8.3. A specially crafted file can lead to an out-of-bounds write. A victim needs to open a malicious file to trigger this vulnerability. The vulnerability exists because the "Num of blocks" value from the CXSPARSE record is not validated properly. An attacker can control the loop counter leading to arbitrary memory write.

Cisco Talos worked with PowerISO to ensure that these issues are resolved and an update is available for affected customers, all in adherence to Cisco’s vulnerability disclosure policy.

Although PowerISO has fixed this issue, they did not change the version number on the fixed release. Users should confirm that they are running PowerISO, version 8.3 with the most recent bug fixes. Talos tested and confirmed this version of PowerISO could be exploited by this vulnerability.

The following Snort rules will detect exploitation attempts against this vulnerability: 60805-60806. Additional rules may be released in the future and current rules are subject to change, pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

❌
❌