The AMD ATI atidsmxx.sys 3.0.502.0 driver on Windows Vista allows local users to bypass the driver signing policy, write to arbitrary kernel memory locations, and thereby gain privileges via unspecified vectors, as demonstrated by "Purple Pill".

Project Subscriptions

Vendors Products
Catalyst Driver Subscribe
Catalyst Driver Subscribe
Microsoft Subscribe
Windows Vista Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2007-4298 The AMD ATI atidsmxx.sys 3.0.502.0 driver on Windows Vista allows local users to bypass the driver signing policy, write to arbitrary kernel memory locations, and thereby gain privileges via unspecified vectors, as demonstrated by "Purple Pill".
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-07T14:53:55.183Z

Reserved: 2007-08-13T04:00:00.000Z

Link: CVE-2007-4315

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2007-08-13T21:17:00.000

Modified: 2025-04-09T00:30:58.490

Link: CVE-2007-4315

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses