7.8
CVSSv3

CVE-2016-8807

Published: 08/11/2016 Updated: 07/03/2019
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 725
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

For the NVIDIA Quadro, NVS, and GeForce products, NVIDIA Windows GPU Display Driver R340 prior to 342.00 and R375 prior to 375.63 contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgDdiEscape ID 0x10000e9 where a value is passed from an user to the driver is used without validation as the size input to memcpy() causing a stack buffer overflow, leading to denial of service or potential escalation of privileges.

Vulnerable Product Search on Vulmon Subscribe to Product

nvidia gpu_driver

Exploits

Source: bugschromiumorg/p/project-zero/issues/detail?id=947 The escape handler for 0x10000e9 lacks bounds checks, and passes a user specified size as the size to memcpy, resulting in a stack buffer overflow: bool escape_10000e9(NvMiniportDeviceContext *a1, Escape10000e9 *escape) { LOBYTE(a9) = escape_->unknown_5[1] != 0; LO ...