Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2016-8807

CWE-2645 documents5 sources
Severity
7.8HIGH
EPSS
0.4%
top 40.56%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedNov 8
Latest updateMay 14

Description

For the NVIDIA Quadro, NVS, and GeForce products, NVIDIA Windows GPU Display Driver R340 before 342.00 and R375 before 375.63 contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgDdiEscape ID 0x10000e9 where a value is passed from an user to the driver is used without validation as the size input to memcpy() causing a stack buffer overflow, leading to denial of service or potential escalation of privileges.

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages1 packages

NVDnvidia/gpu_driver340342.00+1

Patches

🔴Vulnerability Details

2
GHSA
GHSA-4m5c-vffp-6p57: For the NVIDIA Quadro, NVS, and GeForce products, NVIDIA Windows GPU Display Driver R340 before 3422022-05-14
CVEList
CVE-2016-8807: For the NVIDIA Quadro, NVS, and GeForce products, NVIDIA Windows GPU Display Driver R340 before 3422016-11-08

💥Exploits & PoCs

1
Exploit-DB
NVIDIA Driver - Stack Buffer Overflow in Escape 0x10000e92016-10-31

💬Community

1
Bugzilla
CVE-2015-8807 php-horde-Horde: Cross-site scripting in _renderVarInput_number2016-02-08
CVE-2016-8807 (HIGH CVSS 7.8) | For the NVIDIA Quadro | cvebase.io