For the NVIDIA Quadro, NVS, and GeForce products, NVIDIA Windows GPU Display Driver R340 before 342.00 and R375 before 375.63 contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgDdiEscape ID 0x10000e9 where a value is passed from an user to the driver is used without validation as the size input to memcpy() causing a stack buffer overflow, leading to denial of service or potential escalation of privileges.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
https://support.lenovo.com/us/en/solutions/LEN-10822 | third party advisory |
https://www.exploit-db.com/exploits/40668/ | third party advisory vdb entry exploit |
http://www.securityfocus.com/bid/94002 | third party advisory vdb entry |
http://nvidia.custhelp.com/app/answers/detail/a_id/4247 | patch vendor advisory |