First published: Tue Nov 08 2016(Updated: )
For the NVIDIA Quadro, NVS, and GeForce products, NVIDIA Windows GPU Display Driver R340 before 342.00 and R375 before 375.63 contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgDdiEscape ID 0x600000D where a value passed from a user to the driver is used without validation as the index to an internal array, leading to denial of service or potential escalation of privileges.
Credit: psirt@nvidia.com
Affected Software | Affected Version | How to fix |
---|---|---|
NVIDIA GPU kernel driver | >=340<342.00 | |
NVIDIA GPU kernel driver | >=375<375.63 | |
Microsoft Windows Operating System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7387 is considered a high severity vulnerability due to potential arbitrary code execution.
To fix CVE-2016-7387, update the NVIDIA GPU Display Driver to version 342.00 or higher, and R375 to version 375.63 or higher.
CVE-2016-7387 affects NVIDIA Quadro, NVS, and GeForce products using specific versions of the Windows GPU Display Driver.
CVE-2016-7387 arises from a lack of validation of user-passed values in the kernel mode layer of the NVIDIA driver.
CVE-2016-7387 is considered a local vulnerability, as it requires local user access to exploit.