First published: Mon Aug 13 2007(Updated: )
The AMD ATI atidsmxx.sys 3.0.502.0 driver on Windows Vista allows local users to bypass the driver signing policy, write to arbitrary kernel memory locations, and thereby gain privileges via unspecified vectors, as demonstrated by "Purple Pill".
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Amd Catalyst Driver | ||
Ati Catalyst Driver | ||
Microsoft Windows Vista |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.