Vulnerability Details : CVE-2016-8817
All versions of NVIDIA Windows GPU Display Driver contain a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgDdiEscape where a value passed from a user to the driver is used without validation as the size input to memcpy(), causing a buffer overflow, leading to denial of service or potential escalation of privileges.
Vulnerability category: OverflowDenial of service
Products affected by CVE-2016-8817
- cpe:2.3:a:nvidia:gpu_driver:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-8817
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 9 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-8817
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST | |
7.8
|
HIGH | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2016-8817
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-8817
-
http://www.securityfocus.com/bid/95059
NVIDIA GPU Driver CVE-2016-8817 Local Privilege Escalation Vulnerability
-
http://nvidia.custhelp.com/app/answers/detail/a_id/4257
Security Bulletin: NVIDIA Windows GPU Display Driver contains multiple vulnerabilities in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape | NVIDIAPatch;Vendor Advisory
Jump to