Skip to content

Possible denial of service via access to speech dictionaries and input gestures dialog on secure screens.

Moderate
feerrenrut published GHSA-wg65-7r23-h6p9 Mar 22, 2022

Software

nvda

Affected versions

<2021.3.4

Patched versions

2021.3.4

Description

Summary

Unauthenticated users can modify NVDAs system profile for input gestures and speech dictionaries. This affects all users first (sign-on) interaction with the system. This action is intended to be limited to signed in users with administrator privileges.
If unexpected gestures or speech is being replaced, a user may experience a denial of service. For example, being unable to sign-in to Windows.

Pull request(s)

#13489

Limitations

Input gestures to open one of the affected dialogs need to be created and copied to the system configuration. This requires administrator privileges.

Technical details

Proof of concept

  1. Alice adds an input gesture to open the dictionary dialog, and the input gestures dialog, and copies her config to secure mode.
  2. Mallory uses NVDA from the sign-in screen to open the dictionary dialog and replaces all text with “cat” then the input gesture dialog and remaps gestures for commands (including the dictionary dialog).
  3. Alice goes to sign-in to Windows. Alice can no longer sign-in to Windows as NVDA is inaccessible.

Indicators of compromise

The system profile speech dictionaries can be found in the NVDA install directory:
C:\Program Files (x86)\NVDA\systemConfig\speechDicts

The system profile input gestures can be found in the NVDA install directory:
C:\Program Files (x86)\NVDA\systemConfig\gestures.ini

When copying configuration to secure screens, these will be updated.
These files can be inspected with Notepad to check for unexpected changes.

Workarounds

To prevent unauthenticated users from adjusting these settings on older NVDA versions:

  • run NVDA while logged in, and not in secure mode
  • unbind the input gesture for the input gestures dialog, and the speech and voice dictionary dialogs.
    • Note: The temporary dictionary dialog may still be accessible via the menu, however these settings are temporary
  • copy your configuration for use on secure screens
  • consider limiting administrator privileges of other users of the device, so that they cannot overwrite this by copying their configuration to secure screens

Timeline

This was reported in early March, after the 2021.3.3 release.
A patch was created to be added to a 2021.3.4 patch release in March.

For more information

If you have any questions or comments about this advisory:

Severity

Moderate
5.6
/ 10

CVSS base metrics

Attack vector
Local
Attack complexity
High
Privileges required
High
User interaction
Required
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
High
CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:H/A:H

CVE ID

No known CVE

Weaknesses

No CWEs

Credits