A denial of service vulnerability exists in the D3DKMTEscape handler functionality of AMD ATIKMDAG.SYS (e.g. version 26.20.15029.27017). A specially crafted D3DKMTEscape API request can cause an out-of-bounds read in Windows OS kernel memory area. This vulnerability can be triggered from a non-privileged account.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://www.amd.com/en/corporate/product-security | patch vendor advisory |