Page 2 of 23 results (0.005 seconds)

CVSS: 6.5EPSS: 6%CPEs: 145EXPL: 2

24 Jul 2023 — An issue in “Zen 2” CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information. A flaw was found in hw, in “Zen 2” CPUs. This issue may allow an attacker to access sensitive information under specific microarchitectural circumstances. Daniel Moghimi discovered that some Intel Processors did not properly clear microarchitectural state after speculative execution of various instructions. A local unprivileged user could use this to obtain to sensiti... • https://github.com/sbaresearch/stop-zenbleed-win • CWE-209: Generation of Error Message Containing Sensitive Information CWE-1239: Improper Zeroization of Hardware Register •

CVSS: 8.5EPSS: 0%CPEs: 108EXPL: 0

09 May 2023 — Certain size values in firmware binary headers could trigger out of bounds reads during signature validation, leading to denial of service or potentially limited leakage of information about out-of-bounds memory contents. Certain size values in firmware binary headers could trigger out of bounds reads during signature validation, leading to denial of service or potentially limited leakage of information about out-of-bounds memory contents. • https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001 • CWE-125: Out-of-bounds Read •

CVSS: 5.5EPSS: 0%CPEs: 304EXPL: 0

09 May 2023 — Insufficient bounds checking in ASP may allow an attacker to issue a system call from a compromised ABL which may cause arbitrary memory values to be initialized to zero, potentially leading to a loss of integrity. Insufficient bounds checking in ASP may allow an attacker to issue a system call from a compromised ABL which may cause arbitrary memory values to be initialized to zero, potentially leading to a loss of integrity. • https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 4.7EPSS: 0%CPEs: 340EXPL: 0

14 Feb 2023 — When SMT is enabled, certain AMD processors may speculatively execute instructions using a target from the sibling thread after an SMT mode switch potentially resulting in information disclosure. A flaw was found in HW. When SMT is enabled, certain AMD processors may speculatively execute instructions using a target from the sibling thread after an SMT mode switch, potentially resulting in information disclosure. When SMT is enabled, certain AMD processors may speculatively execute instructions using a targ... • https://security.gentoo.org/glsa/202402-07 •

CVSS: 5.5EPSS: 0%CPEs: 208EXPL: 0

10 Jan 2023 — Failure to validate the integer operand in ASP (AMD Secure Processor) bootloader may allow an attacker to introduce an integer overflow in the L2 directory table in SPI flash resulting in a potential denial of service. No validar el operando entero en el cargador de arranque ASP (AMD Secure Processor) puede permitir que un atacante introduzca un desbordamiento de enteros en la tabla del directorio L2 en SPI flash, lo que resulta en una posible denegación de servicio. • https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1031 • CWE-190: Integer Overflow or Wraparound •

CVSS: 7.8EPSS: 0%CPEs: 294EXPL: 0

10 Jan 2023 — Failure to validate the communication buffer and communication service in the BIOS may allow an attacker to tamper with the buffer resulting in potential SMM (System Management Mode) arbitrary code execution. • https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1031 • CWE-20: Improper Input Validation •

CVSS: 7.8EPSS: 0%CPEs: 252EXPL: 0

09 Nov 2022 — Insufficient verification of missing size check in 'LoadModule' may lead to an out-of-bounds write potentially allowing an attacker with privileges to gain code execution of the OS/kernel by loading a malicious TA. Una verificación insuficiente del tamaño faltante en 'LoadModule' puede provocar una escritura fuera de límites que podría permitir que un atacante con privilegios obtenga la ejecución de código del sistema operativo/kernel cargando un TA malicioso. • https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029 • CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 231EXPL: 0

09 Nov 2022 — Improper parameters handling in AMD Secure Processor (ASP) drivers may allow a privileged attacker to elevate their privileges potentially leading to loss of integrity. El manejo inadecuado de los parámetros en los controladores del AMD Secure Processor (ASP) puede permitir que un atacante privilegiado eleve sus privilegios, lo que podría provocar una pérdida de integridad. • https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029 •

CVSS: 5.5EPSS: 0%CPEs: 180EXPL: 0

09 Nov 2022 — Insufficient memory cleanup in the AMD Secure Processor (ASP) Trusted Execution Environment (TEE) may allow an authenticated attacker with privileges to generate a valid signed TA and potentially poison the contents of the process memory with attacker controlled data resulting in a loss of confidentiality. Una limpieza de memoria insuficiente en AMD Secure Processor (ASP) Trusted Execution Environment (TEE) puede permitir que un atacante autenticado con privilegios genere un TA firmado válido y potencialmen... • https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029 • CWE-401: Missing Release of Memory after Effective Lifetime •

CVSS: 7.8EPSS: 0%CPEs: 98EXPL: 0

09 Nov 2022 — Insufficient verification of multiple header signatures while loading a Trusted Application (TA) may allow an attacker with privileges to gain code execution in that TA or the OS/kernel. La verificación insuficiente de múltiples firmas de encabezado mientras se carga una aplicación confiable (TA) puede permitir que un atacante con privilegios obtenga la ejecución de código en esa TA o el sistema operativo/kernel. • https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029 •