Page 4 of 297 results (0.008 seconds)

CVSS: 5.2EPSS: 0%CPEs: 7EXPL: 0

13 Aug 2024 — Lack of stack protection exploit mechanisms in ASP Secure OS Trusted Execution Environment (TEE) may allow a privileged attacker with access to AMD signing keys to c006Frrupt the return address, causing a stack-based buffer overrun, potentially leading to a denial of service. Lack of stack protection exploit mechanisms in ASP Secure OS Trusted Execution Environment (TEE) may allow a privileged attacker with access to AMD signing keys to c006Frrupt the return address, causing a stack-based buffer overrun, po... • https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 3.9EPSS: 0%CPEs: 7EXPL: 0

13 Aug 2024 — Insufficient access controls in ASP kernel may allow a privileged attacker with access to AMD signing keys and the BIOS menu or UEFI shell to map DRAM regions in protected areas, potentially leading to a loss of platform integrity. Insufficient access controls in ASP kernel may allow a privileged attacker with access to AMD signing keys and the BIOS menu or UEFI shell to map DRAM regions in protected areas, potentially leading to a loss of platform integrity. • https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html • CWE-863: Incorrect Authorization •

CVSS: 7.5EPSS: 0%CPEs: 15EXPL: 0

13 Aug 2024 — An out of bounds memory write when processing the AMD PSP1 Configuration Block (APCB) could allow an attacker with access the ability to modify the BIOS image, and the ability to sign the resulting image, to potentially modify the APCB block resulting in arbitrary code execution. An out of bounds memory write when processing the AMD PSP1 Configuration Block (APCB) could allow an attacker with access the ability to modify the BIOS image, and the ability to sign the resulting image, to potentially modify the ... • https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html • CWE-787: Out-of-bounds Write •

CVSS: 7.5EPSS: 0%CPEs: 11EXPL: 0

09 Aug 2024 — Improper validation in a model specific register (MSR) could allow a malicious program with ring0 access to modify SMM configuration while SMI lock is enabled, potentially leading to arbitrary code execution. A flaw was found in hw. Improper validation in a model-specific register (MSR) could allow a malicious program with ring0 access to modify the SMM configuration while the SMI lock is enabled. This issue can lead to arbitrary code execution. Enrique Nissim and Krzysztof Okupski discovered that some AMD ... • https://https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7014.html • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 7.9EPSS: 0%CPEs: 64EXPL: 1

05 Aug 2024 — Improper restriction of write operations in SNP firmware could allow a malicious hypervisor to potentially overwrite a guest's memory or UMC seed resulting in loss of confidentiality and integrity. • https://github.com/Freax13/cve-2024-21980-poc • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 6.0EPSS: 1%CPEs: 64EXPL: 1

05 Aug 2024 — Improper input validation in SEV-SNP could allow a malicious hypervisor to read or overwrite guest memory potentially leading to data leakage or data corruption. • https://github.com/Freax13/cve-2024-21978-poc • CWE-20: Improper Input Validation •

CVSS: 8.2EPSS: 0%CPEs: 24EXPL: 0

18 Jun 2024 — A potential weakness in AMD SPI protection features may allow a malicious attacker with Ring0 (kernel mode) access to bypass the native System Management Mode (SMM) ROM protections. Una posible debilidad en las funciones de protección AMD SPI puede permitir que un atacante malicioso con acceso Ring0 (modo kernel) evite las protecciones ROM nativas del modo de administración del sistema (SMM). • https://www.amd.com/en/resources/product-security/bulletin/amd-sb-1041.html • CWE-284: Improper Access Control •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

23 Apr 2024 — An out of bounds write vulnerability in the AMD Radeon™ user mode driver for DirectX® 11 could allow an attacker with access to a malformed shader to potentially achieve arbitrary code execution. Una vulnerabilidad de escritura fuera de los límites en el controlador de modo de usuario AMD Radeon™ para DirectX® 11 podría permitir que un atacante con acceso a un sombreador con formato incorrecto logre potencialmente la ejecución de código arbitrario. An out of bounds write vulnerability in the AMD Radeon™ use... • https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6012.html • CWE-787: Out-of-bounds Write •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

23 Apr 2024 — An out of bounds write vulnerability in the AMD Radeon™ user mode driver for DirectX® 11 could allow an attacker with access to a malformed shader to potentially achieve arbitrary code execution. Una vulnerabilidad de escritura fuera de los límites en el controlador de modo de usuario AMD Radeon™ para DirectX® 11 podría permitir que un atacante con acceso a un sombreador con formato incorrecto logre potencialmente la ejecución de código arbitrario. An out of bounds write vulnerability in the AMD Radeon™ use... • https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6012.html • CWE-787: Out-of-bounds Write •

CVSS: 6.0EPSS: 0%CPEs: 15EXPL: 0

13 Feb 2024 — Improper Access Control in the AMD SPI protection feature may allow a user with Ring0 (kernel mode) privileged access to bypass protections potentially resulting in loss of integrity and availability. Un control de acceso inadecuado en la función de protección AMD SPI puede permitir que un usuario con acceso privilegiado Ring0 (modo kernel) evite las protecciones, lo que podría provocar una pérdida de integridad y disponibilidad. Improper Access Control in the AMD SPI protection feature may allow a user wit... • https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7009 • CWE-284: Improper Access Control •