CVE-2021-46791

Insufficient input validation during parsing of the System Management Mode (SMM) binary may allow a maliciously crafted SMM executable binary to corrupt Dynamic Root of Trust for Measurement (DRTM) user application memory that may result in a potential denial of service.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:amd:milanpi_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:amd:milanpi:-:*:*:*:*:*:*:*

History

21 Nov 2024, 06:34

Type Values Removed Values Added
References () https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032 - Vendor Advisory () https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032 - Vendor Advisory
Summary
  • (es) Una validación de entrada insuficiente durante el análisis del binario del System Management Mode (SMM) puede permitir que un binario ejecutable de SMM creado con fines malintencionados corrompa la memoria de la aplicación del usuario de la Dynamic Root of Trust for Measurement (DRTM), lo que puede resultar en una posible denegación de servicio.

08 Aug 2023, 14:22

Type Values Removed Values Added
New CVE

Information

Published : 2023-01-11 08:15

Updated : 2024-11-21 06:34


NVD link : CVE-2021-46791

Mitre link : CVE-2021-46791

CVE.ORG link : CVE-2021-46791


JSON object : View

Products Affected

amd

  • milanpi_firmware
  • milanpi
CWE
CWE-787

Out-of-bounds Write