Responsible imperfection in GeForce Experience

 NVIDIA developers have patched two major vulnerabilities in the GeForce Experience utility. This program is installed together with the drivers for video cards, responds after the automatic software resumption and other functions. In versions of GeForce Experience up to 3.70, a difficult task was found that theoretically allows you to inherit one hundred percent inspection over the system.


When installing the warranty After on the user's computer, the web server for the NodeJS warehouse is blown up, corresponding after the association with the manufacturer's infrastructure. It loads emergency libraries automatically. In some case, the device of this ingredient is located near the control of a potential attacker, and he can change it to malicious code. Failure CVE-2020-5977 earned 8.2 points on the CvSS scale and can cite as if to denial of service, similar to a random elevated verse.

The second vulnerability, CVE-2020-5990, corrects an error in NVIDIA ShadowPlay for the sake of capturing and streaming game video, however, it is possible to cite a local prerogative increase and random code execution. Renewal for the sake of GeForce Experience can be downloaded on the company's website, or you can wait for the freshly baked version to automatically download.

A similar theme has been slammed in GeForce Experience for a year. Then the prospector found a procedure for replacing one of the entire files to which the utility revolves.

Similar After the timephased is utilized for mass or targeted attacks. Vulnerabilities in the programs themselves can be exploited, but in unusual cases the whole chain of software delivery to the user is in a dangerous position. The most well-known incident of this attack is the activity of ShadowHammer, during which a modified program for the sake of ASUS computers was distributed for some time from compromised servers.

What the hell happened:
Nokia specialists shared a report on the detection of malicious software in computer networks that use the company's defense assets. Professionals noticed a decent progress in the number of infected IoT devices: their share between all compromised devices was 32.72% (16.17% a year before). Primarily harmful after being caught for systems near Windows. In second place IoT devices - phones and gadgets based on Android have moved them to the cake.

In the Linux 5. 10 kernel release, we pulled out the setfs () function, which made it possible to refuel writing to the operational memory. According to reliable information from some sources, it was present in the OS kernel since version 0. 10 1991 ages - then it was introduced for the sake of helping outdated systems for the 80386 processor warehouse at that time. In 2010, it turned out that the function could be utilized for rewriting data to which the reader, in the usual modification, cannot have access. A similar glitch in LG smartphones for the Android warehouse was shown in 2016.

Yandex. The browser, and yes in Opera and Safari, had a bug that allowed to falsify the content of the address bar. So far, a bug has been found in Google Chrome, thanks to which user materials are not deleted for the sake of Google personal services (for example, YouTube), even if there is no exception for them. Transcendental, this allows the user to be identified, some refuses to give themselves away, eliminating all previously secure information. Google approved the error and promised to fix it.

A Check Point study argues that phishing emails primarily exploit Microsoft's services. In 19% of cases, phishing attack operators fake messages to make them look like the correspondence of the given company. In second and third places is phishing through the names of DHL and Google, 9% each.