Vulnerability Details : CVE-2015-8328
Unspecified vulnerability in the NVAPI support layer in the NVIDIA GPU graphics driver R340 before 341.92, R352 before 354.35, and R358 before 358.87 on Windows allows local users to obtain sensitive information, cause a denial of service (crash), or possibly gain privileges via unknown vectors. NOTE: this identifier was SPLIT from CVE-2015-7869 per ADT2 and ADT3 due to different vulnerability types and affected versions.
Vulnerability category: OverflowDenial of service
Products affected by CVE-2015-8328
- cpe:2.3:a:nvidia:gpu_driver:*:*:*:*:*:*:*:*
- cpe:2.3:a:nvidia:gpu_driver:*:*:*:*:*:*:*:*
- cpe:2.3:a:nvidia:gpu_driver:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-8328
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 6 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-8328
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.6
|
MEDIUM | AV:L/AC:M/Au:N/C:C/I:P/A:C |
3.4
|
9.5
|
NIST |
CWE ids for CVE-2015-8328
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-8328
-
http://www.securitytracker.com/id/1034176
NVIDIA NVAPI and Kernel Mode Driver Bugs Let Local Users Deny Service, Obtain Potentially Sensitive Information, and Gain Elevated Privielges - SecurityTrackerThird Party Advisory;VDB Entry
-
http://nvidia.custhelp.com/app/answers/detail/a_id/3808/kw/security
Security Bulletin: CVE-2015-7869: Unsanitized User Mode Input | NVIDIAVendor Advisory
Jump to