Microsoft Vulnerability Research Advisory MSVR11-016
Vulnerability in NVIDIA Stereoscopic 3D Driver Could Allow Elevation of Privilege
Microsoft is providing notification of the discovery and remediation of a vulnerability affecting the NVIDIA Stereoscopic 3D driver. Microsoft discovered and disclosed the vulnerability under coordinated vulnerability disclosure to the affected vendor, NVIDIA. NVIDIA has remediated the vulnerability in their software.
A vulnerability exists when the NVIDIA Stereoscopic 3D driver does not correctly validate and sanitize specific commands to a named pipe. An attacker who successfully exploited this vulnerability could run commands in the security context of the Local System and take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights.
Microsoft Vulnerability Research reported this issue to and coordinated with NVIDIA to ensure remediation of this issue. The vulnerability has been assigned the entry CVE-2011-4784, in the Common Vulnerabilities and Exposures list. For more information about updates from NVIDIA, please see the NVIDIA driver download page.
- An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability.
- This vulnerability cannot be exploited automatically through email or through a website.
Purpose of Advisory: To notify users of a vulnerability and its remediation.
Advisory Status: Advisory published.
Recommendation: Review the Suggested Actions section and configure as appropriate.
For more information about this issue, see the following references:
|Common Vulnerabilities and Exposures||CVE-2011-4784|
This advisory discusses the following software:
|NVIDIA Stereoscopic 3D Driver 220.127.116.1136 and earlier versions|
|NVIDIA Stereoscopic 3D Driver 18.104.22.16865 and later versions|
Microsoft thanks the following:
- Jeong Wook Oh of Microsoft Malware Protection Center (MMPC) for working with Microsoft Vulnerability Research to have this vulnerability reported and remediated
The information provided in this advisory is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
- V1.0 (December 20, 2011): Advisory published.