ID |
CVE-2017-0345
|
Summary |
All versions of the NVIDIA Windows GPU Display Driver contain a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgDdiEscape where user provided input used as an array size is not correctly validated allows out of bound access in kernel memory and may lead to denial of service or potential escalation of privileges |
References |
|
Vulnerable Configurations |
|
CVSS |
Base: | 7.2 (as of 17-05-2017 - 19:08) |
Impact: | |
Exploitability: | |
|
CWE |
CWE-129 |
CAPEC |
-
Overflow Buffers
Buffer Overflow attacks target improper or missing bounds checking on buffer operations, typically triggered by input injected by an adversary. As a consequence, an adversary is able to write past the boundaries of allocated buffer regions in memory, causing a program crash or potentially redirection of execution as per the adversaries' choice.
|
Access |
Vector | Complexity | Authentication |
LOCAL |
LOW |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
COMPLETE |
COMPLETE |
COMPLETE |
|
cvss-vector
via4
|
AV:L/AC:L/Au:N/C:C/I:C/A:C
|
refmap
via4
|
|
Last major update |
17-05-2017 - 19:08 |
Published |
09-05-2017 - 21:29 |
Last modified |
17-05-2017 - 19:08 |