Nvidia Display Driver Service Attack Escalates Privileges On Windows Machines 129
L3sPau1 writes "A zero-day exploit has been found in the Nvidia Display Driver Service on Windows machines. An attacker with local access can use the exploit to gain root privileges on a Windows machine. Windows domains with relaxed firewall rules or file sharing enabled can also pull off the exploit, which was posted to Pastebin by researcher Peter Winter-Smith."
Easy solution (Score:4, Insightful)
You call that "editing?" (Score:5, Insightful)
A zero-day exploit has been found in the Nvidia Display Driver Service on Windows machines. [threatpost.com] An attacker with local access can use the exploit to gain root privileges on a Windows machine. Windows domains with relaxed firewall rules or file sharing enabled can also pull off the exploit, which was posted to Pastebin [pastebin.com] by researcher Peter Winter-Smith.
Granted, I've seen worse, but c'mon, man, you're getting paid for this shit.
Pay attention.
Re:Easy solution (Score:2, Insightful)
If they have "local access" hey can pretty much do what anyway