CVE-2021-46746

Lack of stack protection exploit mechanisms in ASP Secure OS Trusted Execution Environment (TEE) may allow a privileged attacker with access to AMD signing keys to c006Frrupt the return address, causing a stack-based buffer overrun, potentially leading to a denial of service.
Configurations

No configuration.

History

31 Oct 2024, 14:35

Type Values Removed Values Added
Summary
  • (es) La falta de mecanismos de explotación de protección de pila en ASP Secure OS Trusted Execution Environment (TEE) puede permitir que un atacante privilegiado con acceso a las claves de firma de AMD c006Frrupt la dirección de retorno, provocando una saturación del búfer basado en la pila, lo que podría conducir a una denegación de servicio.
CWE CWE-120

13 Aug 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-08-13 17:15

Updated : 2024-10-31 14:35


NVD link : CVE-2021-46746

Mitre link : CVE-2021-46746

CVE.ORG link : CVE-2021-46746


JSON object : View

Products Affected

No product.

CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')