Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-ch64-2w7r-7949

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The AMD ATI atidsmxx.sys 3.0.502.0 driver on Windows Vista allows local users to bypass the driver signing policy, write to arbitrary kernel memory locations, and thereby gain privileges via unspecified vectors, as demonstrated by "Purple Pill".

The AMD ATI atidsmxx.sys 3.0.502.0 driver on Windows Vista allows local users to bypass the driver signing policy, write to arbitrary kernel memory locations, and thereby gain privileges via unspecified vectors, as demonstrated by "Purple Pill".

EPSS

Процентиль: 14%
0.00047
Низкий

Связанные уязвимости

nvd
больше 18 лет назад

The AMD ATI atidsmxx.sys 3.0.502.0 driver on Windows Vista allows local users to bypass the driver signing policy, write to arbitrary kernel memory locations, and thereby gain privileges via unspecified vectors, as demonstrated by "Purple Pill".

EPSS

Процентиль: 14%
0.00047
Низкий