First published: Tue Nov 08 2016(Updated: )
For the NVIDIA Quadro, NVS, and GeForce products, NVIDIA Windows GPU Display Driver R340 before 342.00 and R375 before 375.63 contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgDdiEscape ID 0x700010d where a value passed from a user to the driver is used without validation as the index to an internal array, leading to denial of service or potential escalation of privileges.
Credit: psirt@nvidia.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nvidia GPU Driver | >=340<342.00 | |
Nvidia GPU Driver | >=375<375.63 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7385 has been assigned a high severity rating due to potential privilege escalation vulnerabilities.
To address CVE-2016-7385, you should update the NVIDIA GPU driver to version 342.00 or above and also to version 375.63 or above.
CVE-2016-7385 affects various NVIDIA Quadro, NVS, and GeForce products running earlier versions of the NVIDIA Windows GPU Display Driver.
CVE-2016-7385 is classified as a privilege escalation vulnerability within the kernel mode layer of the NVIDIA GPU driver.
CVE-2016-7385 targets the kernel mode driver nvlddmkm.sys, where user input is improperly validated.