CVE-2007-4315
Summary
| CVE | CVE-2007-4315 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2007-08-13 21:17:00 UTC |
| Updated | 2012-10-18 04:00:00 UTC |
| Description | The AMD ATI atidsmxx.sys 3.0.502.0 driver on Windows Vista allows local users to bypass the driver signing policy, write to arbitrary kernel memory locations, and thereby gain privileges via unspecified vectors, as demonstrated by "Purple Pill". |
Risk And Classification
Problem Types: CWE-264
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Amd | Catalyst Driver | All | All | All | All |
| Application | Amd | Catalyst Driver | All | All | All | All |
| Application | Ati | Catalyst Driver | All | All | All | All |
| Application | Ati | Catalyst Driver | All | All | All | All |
| Operating System | Microsoft | Windows Vista | All | All | All | All |
| Operating System | Microsoft | Windows Vista | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Vista kernel tampering tool released, then mysteriously disappears | Zero Day | ZDNet.com | MISC | blogs.zdnet.com | |
| AMD ATI ATIDSMXX.SYS Driver Local Privilege Escalation Vulnerability | BID | www.securityfocus.com | |
| AMD Catalyst Software Suite DSM Dynamic Driver Vista Kernel Protection Bypass - Advisories - Secunia | SECUNIA | secunia.com | |
| » UPDATE: ATI driver flaw exposes Vista kernel to attackers | Zero Day | ZDNet.com | MISC | blogs.zdnet.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.