First published: Tue Nov 08 2016(Updated: )
For the NVIDIA Quadro, NVS, and GeForce products, NVIDIA Windows GPU Display Driver R340 before 342.00 and R375 before 375.63 contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgDdiEscape ID 0x100010b where a missing array bounds check can allow a user to write to kernel memory, leading to denial of service or potential escalation of privileges.
Credit: psirt@nvidia.com
Affected Software | Affected Version | How to fix |
---|---|---|
NVIDIA GPU kernel driver | >=340<342.00 | |
NVIDIA GPU kernel driver | >=375<375.63 | |
Microsoft Windows Operating System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7391 has a high severity rating due to its potential to allow unauthorized access to kernel memory.
To fix CVE-2016-7391, update your NVIDIA GPU Display Driver to versions 342.00 or later, or to versions 375.63 or later.
CVE-2016-7391 affects NVIDIA Quadro, NVS, and GeForce products running vulnerable versions of the NVIDIA Windows GPU Display Driver.
CVE-2016-7391 primarily requires local access to exploit, limiting the risk of remote exploitation.
The impact of CVE-2016-7391 can lead to system crashes or arbitrary code execution due to unchecked memory access in the driver.