Description
All versions of NVIDIA Windows GPU Display Driver contain a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgDdiEscape where a value passed from a user to the driver is used without validation as the size input to memcpy(), causing a buffer overflow, leading to denial of service or potential escalation of privileges.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2016-9642 | All versions of NVIDIA Windows GPU Display Driver contain a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgDdiEscape where a value passed from a user to the driver is used without validation as the size input to memcpy(), causing a buffer overflow, leading to denial of service or potential escalation of privileges. |
References
History
No history.
Status: PUBLISHED
Assigner: nvidia
Published:
Updated: 2024-08-06T02:35:02.201Z
Reserved: 2016-10-18T00:00:00.000Z
Link: CVE-2016-8817
No data.
Status : Modified
Published: 2016-12-16T21:59:00.410
Modified: 2026-05-06T22:30:45.220
Link: CVE-2016-8817
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD