6.6
CVSSv2

CVE-2015-7869

Published: 24/11/2015 Updated: 13/02/2019
CVSS v2 Base Score: 6.6 | Impact Score: 9.5 | Exploitability Score: 3.4
VMScore: 587
Vector: AV:L/AC:M/Au:N/C:C/I:P/A:C

Vulnerability Summary

Multiple integer overflows in the kernel mode driver for the NVIDIA GPU graphics driver R340 prior to 341.92, R352 prior to 354.35, and R358 prior to 358.87 on Windows and R304 prior to 304.131, R340 prior to 340.96, R352 prior to 352.63, and R358 prior to 358.16 on Linux allow local users to obtain sensitive information, cause a denial of service (crash), or possibly gain privileges via unknown vectors, which trigger uninitialized or out of bounds memory access. NOTE: this identifier has been SPLIT per ADT2 and ADT3 due to different vulnerability type and affected versions. See CVE-2015-8328 for the vulnerability in the NVAPI support layer in NVIDIA drivers for Windows.

Vulnerable Product Search on Vulmon Subscribe to Product

canonical ubuntu linux 15.10

canonical ubuntu linux 15.04

canonical ubuntu linux 12.04

canonical ubuntu linux 14.04

nvidia gpu_driver

nvidia gpu_driver 346.22

Vendor Advisories

Debian Bug report logs - #805917 nvidia-graphics-drivers: CVE-2015-7869 Unsanitized User Mode Input Package: src:nvidia-graphics-drivers; Maintainer for src:nvidia-graphics-drivers is Debian NVIDIA Maintainers <pkg-nvidia-devel@listsaliothdebianorg>; Reported by: Andreas Beckmann <anbe@debianorg> Date: Tue, 24 Nov ...