First published: Sat Nov 09 2019(Updated: )
NVIDIA GeForce Experience, all versions prior to 3.20.0.118, contains a vulnerability when GameStream is enabled in which an attacker with local system access can load the Intel graphics driver DLLs without validating the path or signature (also known as a binary planting or DLL preloading attack), which may lead to denial of service, information disclosure, or escalation of privileges through code execution.
Credit: psirt@nvidia.com
Affected Software | Affected Version | How to fix |
---|---|---|
NVIDIA GeForce Experience | <3.20.0.118 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
NVIDIA GeForce Experience vulnerability (CVE-2019-5701) is a security flaw that allows an attacker with local system access to load Intel graphics driver DLLs without validating the path or signature, potentially leading to a binary planting or DLL preloading attack.
The severity level of NVIDIA GeForce Experience vulnerability (CVE-2019-5701) is high with a severity value of 7.8.
NVIDIA GeForce Experience versions prior to 3.20.0.118 are affected by the vulnerability (CVE-2019-5701).
An attacker with local system access can exploit NVIDIA GeForce Experience vulnerability (CVE-2019-5701) by loading Intel graphics driver DLLs without validating the path or signature.
Yes, you can find more information about NVIDIA GeForce Experience vulnerability (CVE-2019-5701) in the following references: [Link 1](https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-011.md) and [Link 2](https://nvidia.custhelp.com/app/answers/detail/a_id/4860).