spacer spacer  
 Vulnerability Informationspacer Vulnerability Scanningspacer Communityspacer Blog - new entry!spacer Corporate Informationspacer Online Shopspacer Customer Login  
 Secunia Advisoriesspacer Secunia Researchspacer Binary Analysis  
Home > Vulnerability Information > Secunia Advisories > AMD ATI Radeon ATIKMDAG.SYS Kernel Driver Denial of Service
Secunia Advisories
Advisories
Search
Advisories by Product
Advisories by Vendor
Historic Advisories
Mailing Lists
Report Vulnerability
Contact Form
Business Solutions spacer
Partner Solutions spacer
About


spacer
 
AMD ATI Radeon ATIKMDAG.SYS Kernel Driver Denial of Service
Secunia Advisory: SA24667
Advisory Toolbox: spacer
spacer Issue ticket
spacer Save in to-do list
spacer Mark as handled
spacer Exploit information
spacer Download as PDF
spacer Review actions
spacer Add comment
Release Date: 2007-03-30
Last Update: 2007-08-20
Popularity: 21,356 views

Critical: spacer
Not critical
Impact: DoS
Where: From local network
Solution Status: Vendor Patch

OS:Microsoft Windows Vista

Software:ATI Radeon ATIKMDAG.SYS Kernel Driver

Secunia CVSS-2 Score: Available in Secunia business solutions spacer

Subscribe: Instant alerts on relevant vulnerabilities spacer


Advisory Content (Page 1 of 3)[ 1 ] [ 2 ] [ 3 ]
Secunia is hiring, read about the open positions here!

Description:
A weakness has been reported in AMD ATI Radeon Kernel Driver, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

The weakness is caused due to an unspecified error within the ATI Radeon Kernel Driver (atikmdag.sys) in certain system configurations. This can be exploited to crash the system by e.g. enabling the slideshow feature on certain directories, or loading or quitting certain games.

Change Page:
[ 1 ] [ 2 ] [ 3 ]



Track this Secunia Advisory
Customers of the Secunia Vulnerability Intelligence solutions will automatically receive updates when new information regarding this advisory is released.

Read more about our Vulnerability Intelligence solutions and what they can do for you and your company.

About this Secunia Advisory
Please note: The information that this Secunia Advisory is based on comes from a third party unless stated otherwise.

Secunia collects, validates, and verifies all vulnerability reports issued by security research groups, vendors, and others.
  
Latest Advisories

30th Oct, 2009
New advisories: 5
New vulnerabilities: 10
Updated advisories: 8

Moderately // 238 views
Debian update for libhtml-parser-perl
Less // 268 views
Mura CMS Multiple Vulnerabilities
Less // 261 views
Drupal CCK Comment Reference Module Security Bypass
Not // 324 views
Red Hat update for pidgin
Not // 266 views
Red Hat update for pidgin

29th Oct, 2009
New advisories: 18
New vulnerabilities: 52
Updated advisories: 26

Less // 382 views
Drupal Workflow Module Script Insertion Vulnerabilities
Less // 329 views
Drupal Storm Module Security Bypass Vulnerability
Moderately // 364 views
PunBB Attachment Plugin "secure_str" SQL Injection Vulnerability
Not // 414 views
F-Secure Products PDF Handling Security Bypass
Less // 350 views
Drupal FAQ Ask Module Multiple Vulnerabilities

spacer Solutions | More...  


Send Feedback to Secunia
If you have new information regarding this Secunia advisory or a product in our database, please send it to us using either our web form or email us at vuln@secunia.com.

Ideas, suggestions, and other feedback are most welcome.

Most Popular - 3 Hours

1. Mozilla Firefox Multiple Vulnerabilities // 33 views
2. Internet Explorer Charset Inheritance Cross-Site Scripting Vulnerability // 25 views
3. Red Hat update for pidgin // 23 views
4. Adobe Flash Player Multiple Vulnerabilities // 22 views
5. Red Hat update for postgresql // 17 views
6. Red Hat update for java-1.6.0-openjdk // 16 views
7. Red Hat update for samba // 16 views
8. Fedora update for java-1.6.0-openjdk // 16 views
9. Red Hat update for openoffice.org // 16 views
10. Opera Multiple Vulnerabilities // 14 views



Contact | Terms & Conditions and Copyright | Report Vulnerability | Press | Jobs (open positions) | About Secunia
Copyright Secunia 2002-2009
Secunia Advisory -->
gipoco.com is neither affiliated with the authors of this page nor responsible for its contents. This is a safe-cache copy of the original web site.