The AMD ATI atidsmxx.sys 3.0.502.0 driver on Windows Vista allows local users to bypass the driver signing policy, write to arbitrary kernel memory locations, and thereby gain privileges via unspecified vectors, as demonstrated by "Purple Pill".
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 00:35
Type | Values Removed | Values Added |
---|---|---|
References | () http://blogs.zdnet.com/security/?p=427 - | |
References | () http://blogs.zdnet.com/security/?p=438 - | |
References | () http://secunia.com/advisories/26448 - | |
References | () http://www.securityfocus.com/bid/25265 - |
Information
Published : 2007-08-13 21:17
Updated : 2024-11-21 00:35
NVD link : CVE-2007-4315
Mitre link : CVE-2007-4315
CVE.ORG link : CVE-2007-4315
JSON object : View
Products Affected
ati
- catalyst_driver
microsoft
- windows_vista
amd
- catalyst_driver
CWE
CWE-264
Permissions, Privileges, and Access Controls