Insufficient input validation during parsing of the System Management Mode (SMM) binary may allow a maliciously crafted SMM executable binary to corrupt Dynamic Root of Trust for Measurement (DRTM) user application memory that may result in a potential denial of service.
References
Link | Resource |
---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
07 Nov 2023, 03:40
Type | Values Removed | Values Added |
---|---|---|
Summary | Insufficient input validation during parsing of the System Management Mode (SMM) binary may allow a maliciously crafted SMM executable binary to corrupt Dynamic Root of Trust for Measurement (DRTM) user application memory that may result in a potential denial of service. |
08 Aug 2023, 14:22
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-787 |
Information
Published : 2023-01-11 08:15
Updated : 2024-02-28 19:51
NVD link : CVE-2021-46791
Mitre link : CVE-2021-46791
CVE.ORG link : CVE-2021-46791
JSON object : View
Products Affected
amd
- milanpi
- milanpi_firmware
CWE
CWE-787
Out-of-bounds Write