First published: Tue Nov 08 2016(Updated: )
For the NVIDIA Quadro, NVS, and GeForce products, NVIDIA Windows GPU Display Driver R340 before 342.00 and R375 before 375.63 contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgDdiEscape ID 0x10000e9 where a value is passed from an user to the driver is used without validation as the size input to memcpy() causing a stack buffer overflow, leading to denial of service or potential escalation of privileges.
Credit: psirt@nvidia.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nvidia Gpu Driver | >=340<342.00 | |
Nvidia Gpu Driver | >=375<375.63 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-8807 is considered a high severity vulnerability due to the potential for privilege escalation.
To fix CVE-2016-8807, update the NVIDIA GPU Display Driver to version 342.00 or later, or to version 375.63 or later.
CVE-2016-8807 affects NVIDIA Quadro, NVS, and GeForce products with specific driver versions prior to the updates mentioned.
CVE-2016-8807 is a kernel mode vulnerability that can allow an attacker to execute code in the context of the kernel.
CVE-2016-8807 is generally not considered remotely exploitable as it requires local access to the machine.