The AMD ATI atidsmxx.sys 3.0.502.0 driver on Windows Vista allows local users to bypass the driver signing policy, write to arbitrary kernel memory locations, and thereby gain privileges via unspecified vectors, as demonstrated by "Purple Pill".
References
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2007-08-13 14:17
Updated : 2012-10-17 21:00
NVD link : CVE-2007-4315
Mitre link : CVE-2007-4315
JSON object : View
CWE
CWE-264
Permissions, Privileges, and Access Controls
Products Affected
ati
- catalyst_driver
microsoft
- windows_vista
amd
- catalyst_driver