First published: Mon Aug 13 2007(Updated: )
The AMD ATI atidsmxx.sys 3.0.502.0 driver on Windows Vista allows local users to bypass the driver signing policy, write to arbitrary kernel memory locations, and thereby gain privileges via unspecified vectors, as demonstrated by "Purple Pill".
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
AMD Catalyst Driver | ||
AMD Catalyst Driver | ||
Microsoft Windows Vista |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-4315 has a medium severity rating due to its ability to allow local users to escalate privileges.
To mitigate CVE-2007-4315, update to a newer version of the AMD Catalyst Driver that addresses this vulnerability.
Users running the AMD ATI atidsmxx.sys driver version 3.0.502.0 on Windows Vista are affected by CVE-2007-4315.
An attacker can bypass driver signing policy and write to arbitrary kernel memory, potentially gaining elevated privileges.
Yes, CVE-2007-4315 specifically affects the Windows Vista operating system.