CVE-2007-4315

The AMD ATI atidsmxx.sys 3.0.502.0 driver on Windows Vista allows local users to bypass the driver signing policy, write to arbitrary kernel memory locations, and thereby gain privileges via unspecified vectors, as demonstrated by "Purple Pill".
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:amd:catalyst_driver:*:*:*:*:*:*:*:*
cpe:2.3:a:ati:catalyst_driver:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:35

Type Values Removed Values Added
References () http://blogs.zdnet.com/security/?p=427 - () http://blogs.zdnet.com/security/?p=427 -
References () http://blogs.zdnet.com/security/?p=438 - () http://blogs.zdnet.com/security/?p=438 -
References () http://secunia.com/advisories/26448 - () http://secunia.com/advisories/26448 -
References () http://www.securityfocus.com/bid/25265 - () http://www.securityfocus.com/bid/25265 -

Information

Published : 2007-08-13 21:17

Updated : 2024-11-21 00:35


NVD link : CVE-2007-4315

Mitre link : CVE-2007-4315

CVE.ORG link : CVE-2007-4315


JSON object : View

Products Affected

ati

  • catalyst_driver

microsoft

  • windows_vista

amd

  • catalyst_driver
CWE
CWE-264

Permissions, Privileges, and Access Controls