Search criteria Use this form to refine search results.
Full-text search supports keyword queries with ranking and filtering.
You can combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by date instead of relevance.

52 vulnerabilities found for AMD Radeon Software by AMD

CVE-2020-12962 (GCVE-0-2020-12962)

Vulnerability from nvd – Published: 2021-11-15 19:42 – Updated: 2024-09-16 22:09
VLAI?
Summary
Escape call interface in the AMD Graphics Driver for Windows may cause privilege escalation.
Severity ?
No CVSS data available.
CWE
  • NA
Assigner
AMD
References
Impacted products
Vendor Product Version
AMD AMD Radeon Software Affected: Radeon Software , < 20.11.2 (custom)
Affected: Radeon Pro Software for Enterprise , < 21.Q2 (custom)
Create a notification for this product.
Date Public ?
2021-11-09 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:19.192Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD Radeon Software",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "20.11.2",
              "status": "affected",
              "version": "Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "21.Q2",
              "status": "affected",
              "version": "Radeon Pro Software for Enterprise",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Escape call interface in the AMD Graphics Driver for Windows may cause privilege escalation."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "NA",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-15T19:42:43.000Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1000",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2020-12962",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AMD Radeon Software",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Software",
                            "version_value": "20.11.2"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Pro Software for Enterprise",
                            "version_value": "21.Q2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Escape call interface in the AMD Graphics Driver for Windows may cause privilege escalation."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "NA"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1000",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12962",
    "datePublished": "2021-11-15T19:42:43.185Z",
    "dateReserved": "2020-05-15T00:00:00.000Z",
    "dateUpdated": "2024-09-16T22:09:11.342Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-12960 (GCVE-0-2020-12960)

Vulnerability from nvd – Published: 2021-11-15 19:47 – Updated: 2024-09-17 03:53
VLAI?
Summary
AMD Graphics Driver for Windows 10, amdfender.sys may improperly handle input validation on InputBuffer which may result in a denial of service (DoS).
Severity ?
No CVSS data available.
CWE
  • NA
Assigner
AMD
References
Impacted products
Vendor Product Version
AMD AMD Radeon Software Affected: Radeon Software , < 21.4.1 (custom)
Affected: Radeon Pro Software for Enterprise , < 21.Q2 (custom)
Create a notification for this product.
Date Public ?
2021-11-09 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:19.103Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD Radeon Software",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "21.4.1",
              "status": "affected",
              "version": "Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "21.Q2",
              "status": "affected",
              "version": "Radeon Pro Software for Enterprise",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "AMD Graphics Driver for Windows 10, amdfender.sys may improperly handle input validation on InputBuffer which may result in a denial of service (DoS)."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "NA",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-15T19:47:19.000Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1000",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2020-12960",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AMD Radeon Software",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Software",
                            "version_value": "21.4.1"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Pro Software for Enterprise",
                            "version_value": "21.Q2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "AMD Graphics Driver for Windows 10, amdfender.sys may improperly handle input validation on InputBuffer which may result in a denial of service (DoS)."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "NA"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1000",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12960",
    "datePublished": "2021-11-15T19:47:19.313Z",
    "dateReserved": "2020-05-15T00:00:00.000Z",
    "dateUpdated": "2024-09-17T03:53:03.583Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-12905 (GCVE-0-2020-12905)

Vulnerability from nvd – Published: 2021-11-15 19:40 – Updated: 2024-09-17 00:36
VLAI?
Summary
Out of Bounds Read in AMD Graphics Driver for Windows 10 in Escape 0x3004403 may lead to arbitrary information disclosure.
Severity ?
No CVSS data available.
CWE
  • NA
Assigner
AMD
References
Impacted products
Vendor Product Version
AMD AMD Radeon Software Affected: Radeon Software , < 20.11.2 (custom)
Affected: Radeon Pro Software for Enterprise , < 21.Q2 (custom)
Create a notification for this product.
Date Public ?
2021-11-09 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:19.090Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD Radeon Software",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "20.11.2",
              "status": "affected",
              "version": "Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "21.Q2",
              "status": "affected",
              "version": "Radeon Pro Software for Enterprise",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Out of Bounds Read in AMD Graphics Driver for Windows 10 in Escape 0x3004403 may lead to arbitrary information disclosure."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "NA",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-15T19:40:02.000Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1000",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2020-12905",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AMD Radeon Software",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Software",
                            "version_value": "20.11.2"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Pro Software for Enterprise",
                            "version_value": "21.Q2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Out of Bounds Read in AMD Graphics Driver for Windows 10 in Escape 0x3004403 may lead to arbitrary information disclosure."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "NA"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1000",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12905",
    "datePublished": "2021-11-15T19:40:02.588Z",
    "dateReserved": "2020-05-15T00:00:00.000Z",
    "dateUpdated": "2024-09-17T00:36:22.821Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-12903 (GCVE-0-2020-12903)

Vulnerability from nvd – Published: 2021-11-15 19:44 – Updated: 2024-09-17 00:52
VLAI?
Summary
Out of Bounds Write and Read in AMD Graphics Driver for Windows 10 in Escape 0x6002d03 may lead to escalation of privilege or denial of service.
Severity ?
No CVSS data available.
CWE
  • NA
Assigner
AMD
References
Impacted products
Vendor Product Version
AMD AMD Radeon Software Affected: Radeon Software , < 20.11.2 (custom)
Affected: Radeon Pro Software for Enterprise , < 21.Q2 (custom)
Create a notification for this product.
Date Public ?
2021-11-09 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:18.704Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD Radeon Software",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "20.11.2",
              "status": "affected",
              "version": "Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "21.Q2",
              "status": "affected",
              "version": "Radeon Pro Software for Enterprise",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Out of Bounds Write and Read in AMD Graphics Driver for Windows 10 in Escape 0x6002d03 may lead to escalation of privilege or denial of service."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "NA",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-15T19:44:12.000Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1000",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2020-12903",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AMD Radeon Software",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Software",
                            "version_value": "20.11.2"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Pro Software for Enterprise",
                            "version_value": "21.Q2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Out of Bounds Write and Read in AMD Graphics Driver for Windows 10 in Escape 0x6002d03 may lead to escalation of privilege or denial of service."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "NA"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1000",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12903",
    "datePublished": "2021-11-15T19:44:12.722Z",
    "dateReserved": "2020-05-15T00:00:00.000Z",
    "dateUpdated": "2024-09-17T00:52:24.174Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-12901 (GCVE-0-2020-12901)

Vulnerability from nvd – Published: 2021-11-15 19:20 – Updated: 2024-09-17 03:17
VLAI?
Summary
Arbitrary Free After Use in AMD Graphics Driver for Windows 10 may lead to KASLR bypass or information disclosure.
Severity ?
No CVSS data available.
CWE
  • NA
Assigner
AMD
References
Impacted products
Vendor Product Version
AMD AMD Radeon Software Affected: Radeon Software , < 20.11.2 (custom)
Affected: Radeon Pro Software for Enterprise , < 21.Q2 (custom)
Create a notification for this product.
Date Public ?
2021-11-09 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:19.064Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD Radeon Software",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "20.11.2",
              "status": "affected",
              "version": "Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "21.Q2",
              "status": "affected",
              "version": "Radeon Pro Software for Enterprise",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Arbitrary Free After Use in AMD Graphics Driver for Windows 10 may lead to KASLR bypass or information disclosure."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "NA",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-15T19:20:07.000Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1000",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2020-12901",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AMD Radeon Software",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Software",
                            "version_value": "20.11.2"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Pro Software for Enterprise",
                            "version_value": "21.Q2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Arbitrary Free After Use in AMD Graphics Driver for Windows 10 may lead to KASLR bypass or information disclosure."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "NA"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1000",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12901",
    "datePublished": "2021-11-15T19:20:07.896Z",
    "dateReserved": "2020-05-15T00:00:00.000Z",
    "dateUpdated": "2024-09-17T03:17:36.985Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-12894 (GCVE-0-2020-12894)

Vulnerability from nvd – Published: 2021-11-15 19:48 – Updated: 2024-09-17 01:45
VLAI?
Summary
Arbitrary Write in AMD Graphics Driver for Windows 10 in Escape 0x40010d may lead to arbitrary write to kernel memory or denial of service.
Severity ?
No CVSS data available.
CWE
  • NA
Assigner
AMD
References
Impacted products
Vendor Product Version
AMD AMD Radeon Software Affected: Radeon Software , < 20.7.1 (custom)
Affected: Radeon Pro Software for Enterprise , < 21.Q2 (custom)
Create a notification for this product.
Date Public ?
2021-11-09 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:19.130Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD Radeon Software",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "20.7.1",
              "status": "affected",
              "version": "Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "21.Q2",
              "status": "affected",
              "version": "Radeon Pro Software for Enterprise",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Arbitrary Write in AMD Graphics Driver for Windows 10 in Escape 0x40010d may lead to arbitrary write to kernel memory or denial of service."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "NA",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-15T19:48:37.000Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1000",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2020-12894",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AMD Radeon Software",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Software",
                            "version_value": "20.7.1"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Pro Software for Enterprise",
                            "version_value": "21.Q2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Arbitrary Write in AMD Graphics Driver for Windows 10 in Escape 0x40010d may lead to arbitrary write to kernel memory or denial of service."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "NA"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1000",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12894",
    "datePublished": "2021-11-15T19:48:37.220Z",
    "dateReserved": "2020-05-15T00:00:00.000Z",
    "dateUpdated": "2024-09-17T01:45:55.094Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-12893 (GCVE-0-2020-12893)

Vulnerability from nvd – Published: 2021-11-15 19:45 – Updated: 2024-09-16 23:15
VLAI?
Summary
Stack Buffer Overflow in AMD Graphics Driver for Windows 10 in Escape 0x15002a may lead to escalation of privilege or denial of service.
Severity ?
No CVSS data available.
CWE
  • NA
Assigner
AMD
References
Impacted products
Vendor Product Version
AMD AMD Radeon Software Affected: Radeon Software , < 20.7.1 (custom)
Affected: Radeon Pro Software for Enterprise , < 21.Q2 (custom)
Create a notification for this product.
Date Public ?
2021-11-09 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:18.856Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD Radeon Software",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "20.7.1",
              "status": "affected",
              "version": "Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "21.Q2",
              "status": "affected",
              "version": "Radeon Pro Software for Enterprise",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack Buffer Overflow in AMD Graphics Driver for Windows 10 in Escape 0x15002a may lead to escalation of privilege or denial of service."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "NA",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-12-27T18:14:45.000Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1000",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2020-12893",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AMD Radeon Software",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Software",
                            "version_value": "20.7.1"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Pro Software for Enterprise",
                            "version_value": "21.Q2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack Buffer Overflow in AMD Graphics Driver for Windows 10 in Escape 0x15002a may lead to escalation of privilege or denial of service."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "NA"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1000",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12893",
    "datePublished": "2021-11-15T19:45:36.942Z",
    "dateReserved": "2020-05-15T00:00:00.000Z",
    "dateUpdated": "2024-09-16T23:15:51.176Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-12898 (GCVE-0-2020-12898)

Vulnerability from nvd – Published: 2021-11-15 18:58 – Updated: 2024-09-17 03:03
VLAI?
Summary
Stack Buffer Overflow in AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.
Severity ?
No CVSS data available.
CWE
  • NA
Assigner
AMD
References
Impacted products
Vendor Product Version
AMD AMD Radeon Software Affected: Radeon Software , < 20.11.2 (custom)
Affected: Radeon Pro Software for Enterprise , < 21.Q2 (custom)
Create a notification for this product.
Date Public ?
2021-11-09 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:18.206Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD Radeon Software",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "20.11.2",
              "status": "affected",
              "version": "Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "21.Q2",
              "status": "affected",
              "version": "Radeon Pro Software for Enterprise",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack Buffer Overflow in AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "NA",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-15T18:58:30.000Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1000",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2020-12898",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AMD Radeon Software",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Software",
                            "version_value": "20.11.2"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Pro Software for Enterprise",
                            "version_value": "21.Q2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack Buffer Overflow in AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "NA"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1000",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12898",
    "datePublished": "2021-11-15T18:58:30.225Z",
    "dateReserved": "2020-05-15T00:00:00.000Z",
    "dateUpdated": "2024-09-17T03:03:38.846Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-12892 (GCVE-0-2020-12892)

Vulnerability from nvd – Published: 2021-11-15 18:39 – Updated: 2024-09-16 17:34
VLAI?
Summary
An untrusted search path in AMD Radeon settings Installer may lead to a privilege escalation or unauthorized code execution.
Severity ?
No CVSS data available.
CWE
  • NA
Assigner
AMD
References
Impacted products
Vendor Product Version
AMD AMD Radeon Software Affected: Radeon Software , < 21.3.1 (custom)
Affected: Radeon Pro Software for Enterprise , < 21.Q2 (custom)
Create a notification for this product.
Date Public ?
2021-11-09 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:19.033Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD Radeon Software",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "21.3.1",
              "status": "affected",
              "version": "Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "21.Q2",
              "status": "affected",
              "version": "Radeon Pro Software for Enterprise",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "An untrusted search path in AMD Radeon settings Installer may lead to a privilege escalation or unauthorized code execution."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "NA",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-12-27T18:14:38.000Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1000",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2020-12892",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AMD Radeon Software",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Software",
                            "version_value": "21.3.1"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Pro Software for Enterprise",
                            "version_value": "21.Q2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An untrusted search path in AMD Radeon settings Installer may lead to a privilege escalation or unauthorized code execution."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "NA"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1000",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12892",
    "datePublished": "2021-11-15T18:39:47.290Z",
    "dateReserved": "2020-05-15T00:00:00.000Z",
    "dateUpdated": "2024-09-16T17:34:18.633Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-12963 (GCVE-0-2020-12963)

Vulnerability from nvd – Published: 2021-11-15 15:58 – Updated: 2024-09-16 22:45
VLAI?
Summary
An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows may allow unprivileged users to compromise the system.
Severity ?
No CVSS data available.
CWE
  • NA
Assigner
AMD
References
Impacted products
Vendor Product Version
AMD AMD Radeon Software Affected: Radeon Software , < 20.11.2 (custom)
Affected: Radeon Pro Software for Enterprise , < 21.Q2 (custom)
Create a notification for this product.
Date Public ?
2021-11-09 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:18.216Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD Radeon Software",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "20.11.2",
              "status": "affected",
              "version": "Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "21.Q2",
              "status": "affected",
              "version": "Radeon Pro Software for Enterprise",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows may allow unprivileged users to compromise the system."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "NA",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-12-27T18:14:56.000Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1000",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2020-12963",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AMD Radeon Software",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Software",
                            "version_value": "20.11.2"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Pro Software for Enterprise",
                            "version_value": "21.Q2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows may allow unprivileged users to compromise the system."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "NA"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1000",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12963",
    "datePublished": "2021-11-15T15:58:06.272Z",
    "dateReserved": "2020-05-15T00:00:00.000Z",
    "dateUpdated": "2024-09-16T22:45:17.132Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-12929 (GCVE-0-2020-12929)

Vulnerability from nvd – Published: 2021-11-15 15:52 – Updated: 2024-09-17 02:00
VLAI?
Summary
Improper parameters validation in some trusted applications of the PSP contained in the AMD Graphics Driver may allow a local attacker to bypass security restrictions and achieve arbitrary code execution .
Severity ?
No CVSS data available.
CWE
  • NA
Assigner
AMD
References
Impacted products
Vendor Product Version
AMD AMD Radeon Software Affected: Radeon Software , < 20.11.2 (custom)
Affected: Radeon Pro Software for Enterprise , < 21.Q2 (custom)
Create a notification for this product.
Date Public ?
2021-11-09 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:18.216Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD Radeon Software",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "20.11.2",
              "status": "affected",
              "version": "Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "21.Q2",
              "status": "affected",
              "version": "Radeon Pro Software for Enterprise",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper parameters validation in some trusted applications of the PSP contained in the AMD Graphics Driver may allow a local attacker to bypass security restrictions and achieve arbitrary code execution ."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "NA",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-12-27T18:14:51.000Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1000",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2020-12929",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AMD Radeon Software",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Software",
                            "version_value": "20.11.2"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Pro Software for Enterprise",
                            "version_value": "21.Q2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper parameters validation in some trusted applications of the PSP contained in the AMD Graphics Driver may allow a local attacker to bypass security restrictions and achieve arbitrary code execution ."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "NA"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1000",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12929",
    "datePublished": "2021-11-15T15:52:18.454Z",
    "dateReserved": "2020-05-15T00:00:00.000Z",
    "dateUpdated": "2024-09-17T02:00:49.330Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-12920 (GCVE-0-2020-12920)

Vulnerability from nvd – Published: 2021-11-15 15:50 – Updated: 2024-09-16 18:49
VLAI?
Summary
A potential denial of service issue exists in the AMD Display driver Escape 0x130007 Call handler. An attacker with low privilege could potentially induce a Windows BugCheck.
Severity ?
No CVSS data available.
CWE
  • NA
Assigner
AMD
References
Impacted products
Vendor Product Version
AMD AMD Radeon Software Affected: Radeon Software , < 20.11.2 (custom)
Affected: Radeon Pro Software for Enterprise , < 21.Q2 (custom)
Create a notification for this product.
Date Public ?
2021-11-09 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:19.124Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD Radeon Software",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "20.11.2",
              "status": "affected",
              "version": "Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "21.Q2",
              "status": "affected",
              "version": "Radeon Pro Software for Enterprise",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "A potential denial of service issue exists in the AMD Display driver Escape 0x130007 Call handler. An attacker with low privilege could potentially induce a Windows BugCheck."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "NA",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-15T15:50:34.000Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1000",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2020-12920",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AMD Radeon Software",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Software",
                            "version_value": "20.11.2"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Pro Software for Enterprise",
                            "version_value": "21.Q2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A potential denial of service issue exists in the AMD Display driver Escape 0x130007 Call handler. An attacker with low privilege could potentially induce a Windows BugCheck."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "NA"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1000",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12920",
    "datePublished": "2021-11-15T15:50:34.930Z",
    "dateReserved": "2020-05-15T00:00:00.000Z",
    "dateUpdated": "2024-09-16T18:49:42.624Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-12904 (GCVE-0-2020-12904)

Vulnerability from nvd – Published: 2021-11-15 15:12 – Updated: 2024-09-16 16:38
VLAI?
Summary
Out of Bounds Read in AMD Graphics Driver for Windows 10 in Escape 0x3004203 may lead to arbitrary information disclosure.
Severity ?
No CVSS data available.
CWE
  • NA
Assigner
AMD
References
Impacted products
Vendor Product Version
AMD AMD Radeon Software Affected: Radeon Software , < 20.11.2 (custom)
Affected: Radeon Pro Software for Enterprise , < 21.Q2 (custom)
Create a notification for this product.
Date Public ?
2021-11-09 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:19.111Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD Radeon Software",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "20.11.2",
              "status": "affected",
              "version": "Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "21.Q2",
              "status": "affected",
              "version": "Radeon Pro Software for Enterprise",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Out of Bounds Read in AMD Graphics Driver for Windows 10 in Escape 0x3004203 may lead to arbitrary information disclosure."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "NA",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-15T15:12:44.000Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1000",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2020-12904",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AMD Radeon Software",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Software",
                            "version_value": "20.11.2"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Pro Software for Enterprise",
                            "version_value": "21.Q2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Out of Bounds Read in AMD Graphics Driver for Windows 10 in Escape 0x3004203 may lead to arbitrary information disclosure."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "NA"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1000",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12904",
    "datePublished": "2021-11-15T15:12:44.714Z",
    "dateReserved": "2020-05-15T00:00:00.000Z",
    "dateUpdated": "2024-09-16T16:38:11.800Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-12902 (GCVE-0-2020-12902)

Vulnerability from nvd – Published: 2021-11-15 15:48 – Updated: 2024-09-16 16:59
VLAI?
Summary
Arbitrary Decrement Privilege Escalation in AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.
Severity ?
No CVSS data available.
CWE
  • NA
Assigner
AMD
References
Impacted products
Vendor Product Version
AMD AMD Radeon Software Affected: Radeon Software , < 20.11.2 (custom)
Affected: Radeon Pro Software for Enterprise , < 21.Q2 (custom)
Create a notification for this product.
Date Public ?
2021-11-09 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:18.204Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD Radeon Software",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "20.11.2",
              "status": "affected",
              "version": "Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "21.Q2",
              "status": "affected",
              "version": "Radeon Pro Software for Enterprise",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Arbitrary Decrement Privilege Escalation in AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "NA",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-15T15:48:41.000Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1000",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2020-12902",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AMD Radeon Software",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Software",
                            "version_value": "20.11.2"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Pro Software for Enterprise",
                            "version_value": "21.Q2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Arbitrary Decrement Privilege Escalation in AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "NA"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1000",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12902",
    "datePublished": "2021-11-15T15:48:41.148Z",
    "dateReserved": "2020-05-15T00:00:00.000Z",
    "dateUpdated": "2024-09-16T16:59:09.552Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-12900 (GCVE-0-2020-12900)

Vulnerability from nvd – Published: 2021-11-15 15:27 – Updated: 2024-09-17 02:21
VLAI?
Summary
An arbitrary write vulnerability in the AMD Radeon Graphics Driver for Windows 10 potentially allows unprivileged users to gain Escalation of Privileges and cause Denial of Service.
Severity ?
No CVSS data available.
CWE
  • NA
Assigner
AMD
References
Impacted products
Vendor Product Version
AMD AMD Radeon Software Affected: Radeon Software , < 20.7.1 (custom)
Affected: Radeon Pro Software for Enterprise , < 21.Q2 (custom)
Create a notification for this product.
Date Public ?
2021-11-09 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:19.394Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD Radeon Software",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "20.7.1",
              "status": "affected",
              "version": "Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "21.Q2",
              "status": "affected",
              "version": "Radeon Pro Software for Enterprise",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "An arbitrary write vulnerability in the AMD Radeon Graphics Driver for Windows 10 potentially allows unprivileged users to gain Escalation of Privileges and cause Denial of Service."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "NA",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-15T15:27:51.000Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1000",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2020-12900",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AMD Radeon Software",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Software",
                            "version_value": "20.7.1"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Pro Software for Enterprise",
                            "version_value": "21.Q2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An arbitrary write vulnerability in the AMD Radeon Graphics Driver for Windows 10 potentially allows unprivileged users to gain Escalation of Privileges and cause Denial of Service."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "NA"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1000",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12900",
    "datePublished": "2021-11-15T15:27:51.589Z",
    "dateReserved": "2020-05-15T00:00:00.000Z",
    "dateUpdated": "2024-09-17T02:21:18.348Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-12899 (GCVE-0-2020-12899)

Vulnerability from nvd – Published: 2021-11-15 15:29 – Updated: 2024-09-16 18:44
VLAI?
Summary
Arbitrary Read in AMD Graphics Driver for Windows 10 may lead to KASLR bypass or denial of service.
Severity ?
No CVSS data available.
CWE
  • NA
Assigner
AMD
References
Impacted products
Vendor Product Version
AMD AMD Radeon Software Affected: Radeon Software , < 20.11.2 (custom)
Affected: Radeon Pro Software for Enterprise , < 21.Q2 (custom)
Create a notification for this product.
Date Public ?
2021-11-09 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:18.946Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD Radeon Software",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "20.11.2",
              "status": "affected",
              "version": "Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "21.Q2",
              "status": "affected",
              "version": "Radeon Pro Software for Enterprise",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Arbitrary Read in AMD Graphics Driver for Windows 10 may lead to KASLR bypass or denial of service."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "NA",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-15T15:29:56.000Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1000",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2020-12899",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AMD Radeon Software",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Software",
                            "version_value": "20.11.2"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Pro Software for Enterprise",
                            "version_value": "21.Q2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Arbitrary Read in AMD Graphics Driver for Windows 10 may lead to KASLR bypass or denial of service."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "NA"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1000",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12899",
    "datePublished": "2021-11-15T15:29:56.401Z",
    "dateReserved": "2020-05-15T00:00:00.000Z",
    "dateUpdated": "2024-09-16T18:44:07.969Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-12897 (GCVE-0-2020-12897)

Vulnerability from nvd – Published: 2021-11-15 15:44 – Updated: 2024-09-16 17:38
VLAI?
Summary
Kernel Pool Address disclosure in AMD Graphics Driver for Windows 10 may lead to KASLR bypass.
Severity ?
No CVSS data available.
CWE
  • NA
Assigner
AMD
References
Impacted products
Vendor Product Version
AMD AMD Radeon Software Affected: Radeon Software , < 21.3.1 (custom)
Affected: Radeon Pro Software for Enterprise , < 21.Q2 (custom)
Create a notification for this product.
Date Public ?
2021-11-09 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:19.036Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD Radeon Software",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "21.3.1",
              "status": "affected",
              "version": "Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "21.Q2",
              "status": "affected",
              "version": "Radeon Pro Software for Enterprise",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Kernel Pool Address disclosure in AMD Graphics Driver for Windows 10 may lead to KASLR bypass."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "NA",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-15T15:44:11.000Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1000",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2020-12897",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AMD Radeon Software",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Software",
                            "version_value": "21.3.1"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Pro Software for Enterprise",
                            "version_value": "21.Q2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Kernel Pool Address disclosure in AMD Graphics Driver for Windows 10 may lead to KASLR bypass."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "NA"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1000",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12897",
    "datePublished": "2021-11-15T15:44:11.456Z",
    "dateReserved": "2020-05-15T00:00:00.000Z",
    "dateUpdated": "2024-09-16T17:38:45.112Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-12895 (GCVE-0-2020-12895)

Vulnerability from nvd – Published: 2021-11-15 15:56 – Updated: 2024-09-16 22:02
VLAI?
Summary
Pool/Heap Overflow in AMD Graphics Driver for Windows 10 in Escape 0x110037 may lead to escalation of privilege, information disclosure or denial of service.
Severity ?
No CVSS data available.
CWE
  • NA
Assigner
AMD
References
Impacted products
Vendor Product Version
AMD AMD Radeon Software Affected: Radeon Software , < 20.11.2 (custom)
Affected: Radeon Pro Software for Enterprise , < 21.Q2 (custom)
Create a notification for this product.
Date Public ?
2021-11-09 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:18.755Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD Radeon Software",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "20.11.2",
              "status": "affected",
              "version": "Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "21.Q2",
              "status": "affected",
              "version": "Radeon Pro Software for Enterprise",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Pool/Heap Overflow in AMD Graphics Driver for Windows 10 in Escape 0x110037 may lead to escalation of privilege, information disclosure or denial of service."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "NA",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-12-27T18:14:44.000Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1000",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2020-12895",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AMD Radeon Software",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Software",
                            "version_value": "20.11.2"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Pro Software for Enterprise",
                            "version_value": "21.Q2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Pool/Heap Overflow in AMD Graphics Driver for Windows 10 in Escape 0x110037 may lead to escalation of privilege, information disclosure or denial of service."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "NA"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1000",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12895",
    "datePublished": "2021-11-15T15:56:00.755Z",
    "dateReserved": "2020-05-15T00:00:00.000Z",
    "dateUpdated": "2024-09-16T22:02:20.505Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-12894 (GCVE-0-2020-12894)

Vulnerability from cvelistv5 – Published: 2021-11-15 19:48 – Updated: 2024-09-17 01:45
VLAI?
Summary
Arbitrary Write in AMD Graphics Driver for Windows 10 in Escape 0x40010d may lead to arbitrary write to kernel memory or denial of service.
Severity ?
No CVSS data available.
CWE
  • NA
Assigner
AMD
References
Impacted products
Vendor Product Version
AMD AMD Radeon Software Affected: Radeon Software , < 20.7.1 (custom)
Affected: Radeon Pro Software for Enterprise , < 21.Q2 (custom)
Create a notification for this product.
Date Public ?
2021-11-09 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:19.130Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD Radeon Software",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "20.7.1",
              "status": "affected",
              "version": "Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "21.Q2",
              "status": "affected",
              "version": "Radeon Pro Software for Enterprise",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Arbitrary Write in AMD Graphics Driver for Windows 10 in Escape 0x40010d may lead to arbitrary write to kernel memory or denial of service."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "NA",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-15T19:48:37.000Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1000",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2020-12894",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AMD Radeon Software",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Software",
                            "version_value": "20.7.1"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Pro Software for Enterprise",
                            "version_value": "21.Q2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Arbitrary Write in AMD Graphics Driver for Windows 10 in Escape 0x40010d may lead to arbitrary write to kernel memory or denial of service."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "NA"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1000",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12894",
    "datePublished": "2021-11-15T19:48:37.220Z",
    "dateReserved": "2020-05-15T00:00:00.000Z",
    "dateUpdated": "2024-09-17T01:45:55.094Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-12960 (GCVE-0-2020-12960)

Vulnerability from cvelistv5 – Published: 2021-11-15 19:47 – Updated: 2024-09-17 03:53
VLAI?
Summary
AMD Graphics Driver for Windows 10, amdfender.sys may improperly handle input validation on InputBuffer which may result in a denial of service (DoS).
Severity ?
No CVSS data available.
CWE
  • NA
Assigner
AMD
References
Impacted products
Vendor Product Version
AMD AMD Radeon Software Affected: Radeon Software , < 21.4.1 (custom)
Affected: Radeon Pro Software for Enterprise , < 21.Q2 (custom)
Create a notification for this product.
Date Public ?
2021-11-09 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:19.103Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD Radeon Software",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "21.4.1",
              "status": "affected",
              "version": "Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "21.Q2",
              "status": "affected",
              "version": "Radeon Pro Software for Enterprise",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "AMD Graphics Driver for Windows 10, amdfender.sys may improperly handle input validation on InputBuffer which may result in a denial of service (DoS)."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "NA",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-15T19:47:19.000Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1000",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2020-12960",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AMD Radeon Software",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Software",
                            "version_value": "21.4.1"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Pro Software for Enterprise",
                            "version_value": "21.Q2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "AMD Graphics Driver for Windows 10, amdfender.sys may improperly handle input validation on InputBuffer which may result in a denial of service (DoS)."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "NA"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1000",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12960",
    "datePublished": "2021-11-15T19:47:19.313Z",
    "dateReserved": "2020-05-15T00:00:00.000Z",
    "dateUpdated": "2024-09-17T03:53:03.583Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-12893 (GCVE-0-2020-12893)

Vulnerability from cvelistv5 – Published: 2021-11-15 19:45 – Updated: 2024-09-16 23:15
VLAI?
Summary
Stack Buffer Overflow in AMD Graphics Driver for Windows 10 in Escape 0x15002a may lead to escalation of privilege or denial of service.
Severity ?
No CVSS data available.
CWE
  • NA
Assigner
AMD
References
Impacted products
Vendor Product Version
AMD AMD Radeon Software Affected: Radeon Software , < 20.7.1 (custom)
Affected: Radeon Pro Software for Enterprise , < 21.Q2 (custom)
Create a notification for this product.
Date Public ?
2021-11-09 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:18.856Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD Radeon Software",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "20.7.1",
              "status": "affected",
              "version": "Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "21.Q2",
              "status": "affected",
              "version": "Radeon Pro Software for Enterprise",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack Buffer Overflow in AMD Graphics Driver for Windows 10 in Escape 0x15002a may lead to escalation of privilege or denial of service."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "NA",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-12-27T18:14:45.000Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1000",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2020-12893",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AMD Radeon Software",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Software",
                            "version_value": "20.7.1"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Pro Software for Enterprise",
                            "version_value": "21.Q2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack Buffer Overflow in AMD Graphics Driver for Windows 10 in Escape 0x15002a may lead to escalation of privilege or denial of service."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "NA"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1000",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12893",
    "datePublished": "2021-11-15T19:45:36.942Z",
    "dateReserved": "2020-05-15T00:00:00.000Z",
    "dateUpdated": "2024-09-16T23:15:51.176Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-12903 (GCVE-0-2020-12903)

Vulnerability from cvelistv5 – Published: 2021-11-15 19:44 – Updated: 2024-09-17 00:52
VLAI?
Summary
Out of Bounds Write and Read in AMD Graphics Driver for Windows 10 in Escape 0x6002d03 may lead to escalation of privilege or denial of service.
Severity ?
No CVSS data available.
CWE
  • NA
Assigner
AMD
References
Impacted products
Vendor Product Version
AMD AMD Radeon Software Affected: Radeon Software , < 20.11.2 (custom)
Affected: Radeon Pro Software for Enterprise , < 21.Q2 (custom)
Create a notification for this product.
Date Public ?
2021-11-09 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:18.704Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD Radeon Software",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "20.11.2",
              "status": "affected",
              "version": "Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "21.Q2",
              "status": "affected",
              "version": "Radeon Pro Software for Enterprise",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Out of Bounds Write and Read in AMD Graphics Driver for Windows 10 in Escape 0x6002d03 may lead to escalation of privilege or denial of service."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "NA",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-15T19:44:12.000Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1000",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2020-12903",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AMD Radeon Software",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Software",
                            "version_value": "20.11.2"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Pro Software for Enterprise",
                            "version_value": "21.Q2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Out of Bounds Write and Read in AMD Graphics Driver for Windows 10 in Escape 0x6002d03 may lead to escalation of privilege or denial of service."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "NA"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1000",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12903",
    "datePublished": "2021-11-15T19:44:12.722Z",
    "dateReserved": "2020-05-15T00:00:00.000Z",
    "dateUpdated": "2024-09-17T00:52:24.174Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-12962 (GCVE-0-2020-12962)

Vulnerability from cvelistv5 – Published: 2021-11-15 19:42 – Updated: 2024-09-16 22:09
VLAI?
Summary
Escape call interface in the AMD Graphics Driver for Windows may cause privilege escalation.
Severity ?
No CVSS data available.
CWE
  • NA
Assigner
AMD
References
Impacted products
Vendor Product Version
AMD AMD Radeon Software Affected: Radeon Software , < 20.11.2 (custom)
Affected: Radeon Pro Software for Enterprise , < 21.Q2 (custom)
Create a notification for this product.
Date Public ?
2021-11-09 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:19.192Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD Radeon Software",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "20.11.2",
              "status": "affected",
              "version": "Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "21.Q2",
              "status": "affected",
              "version": "Radeon Pro Software for Enterprise",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Escape call interface in the AMD Graphics Driver for Windows may cause privilege escalation."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "NA",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-15T19:42:43.000Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1000",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2020-12962",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AMD Radeon Software",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Software",
                            "version_value": "20.11.2"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Pro Software for Enterprise",
                            "version_value": "21.Q2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Escape call interface in the AMD Graphics Driver for Windows may cause privilege escalation."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "NA"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1000",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12962",
    "datePublished": "2021-11-15T19:42:43.185Z",
    "dateReserved": "2020-05-15T00:00:00.000Z",
    "dateUpdated": "2024-09-16T22:09:11.342Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-12905 (GCVE-0-2020-12905)

Vulnerability from cvelistv5 – Published: 2021-11-15 19:40 – Updated: 2024-09-17 00:36
VLAI?
Summary
Out of Bounds Read in AMD Graphics Driver for Windows 10 in Escape 0x3004403 may lead to arbitrary information disclosure.
Severity ?
No CVSS data available.
CWE
  • NA
Assigner
AMD
References
Impacted products
Vendor Product Version
AMD AMD Radeon Software Affected: Radeon Software , < 20.11.2 (custom)
Affected: Radeon Pro Software for Enterprise , < 21.Q2 (custom)
Create a notification for this product.
Date Public ?
2021-11-09 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:19.090Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD Radeon Software",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "20.11.2",
              "status": "affected",
              "version": "Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "21.Q2",
              "status": "affected",
              "version": "Radeon Pro Software for Enterprise",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Out of Bounds Read in AMD Graphics Driver for Windows 10 in Escape 0x3004403 may lead to arbitrary information disclosure."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "NA",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-15T19:40:02.000Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1000",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2020-12905",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AMD Radeon Software",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Software",
                            "version_value": "20.11.2"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Pro Software for Enterprise",
                            "version_value": "21.Q2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Out of Bounds Read in AMD Graphics Driver for Windows 10 in Escape 0x3004403 may lead to arbitrary information disclosure."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "NA"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1000",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12905",
    "datePublished": "2021-11-15T19:40:02.588Z",
    "dateReserved": "2020-05-15T00:00:00.000Z",
    "dateUpdated": "2024-09-17T00:36:22.821Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-12901 (GCVE-0-2020-12901)

Vulnerability from cvelistv5 – Published: 2021-11-15 19:20 – Updated: 2024-09-17 03:17
VLAI?
Summary
Arbitrary Free After Use in AMD Graphics Driver for Windows 10 may lead to KASLR bypass or information disclosure.
Severity ?
No CVSS data available.
CWE
  • NA
Assigner
AMD
References
Impacted products
Vendor Product Version
AMD AMD Radeon Software Affected: Radeon Software , < 20.11.2 (custom)
Affected: Radeon Pro Software for Enterprise , < 21.Q2 (custom)
Create a notification for this product.
Date Public ?
2021-11-09 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:19.064Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD Radeon Software",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "20.11.2",
              "status": "affected",
              "version": "Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "21.Q2",
              "status": "affected",
              "version": "Radeon Pro Software for Enterprise",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Arbitrary Free After Use in AMD Graphics Driver for Windows 10 may lead to KASLR bypass or information disclosure."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "NA",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-15T19:20:07.000Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1000",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2020-12901",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AMD Radeon Software",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Software",
                            "version_value": "20.11.2"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Pro Software for Enterprise",
                            "version_value": "21.Q2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Arbitrary Free After Use in AMD Graphics Driver for Windows 10 may lead to KASLR bypass or information disclosure."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "NA"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1000",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12901",
    "datePublished": "2021-11-15T19:20:07.896Z",
    "dateReserved": "2020-05-15T00:00:00.000Z",
    "dateUpdated": "2024-09-17T03:17:36.985Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-12898 (GCVE-0-2020-12898)

Vulnerability from cvelistv5 – Published: 2021-11-15 18:58 – Updated: 2024-09-17 03:03
VLAI?
Summary
Stack Buffer Overflow in AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.
Severity ?
No CVSS data available.
CWE
  • NA
Assigner
AMD
References
Impacted products
Vendor Product Version
AMD AMD Radeon Software Affected: Radeon Software , < 20.11.2 (custom)
Affected: Radeon Pro Software for Enterprise , < 21.Q2 (custom)
Create a notification for this product.
Date Public ?
2021-11-09 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:18.206Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD Radeon Software",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "20.11.2",
              "status": "affected",
              "version": "Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "21.Q2",
              "status": "affected",
              "version": "Radeon Pro Software for Enterprise",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack Buffer Overflow in AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "NA",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-15T18:58:30.000Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1000",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2020-12898",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AMD Radeon Software",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Software",
                            "version_value": "20.11.2"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Pro Software for Enterprise",
                            "version_value": "21.Q2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack Buffer Overflow in AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "NA"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1000",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12898",
    "datePublished": "2021-11-15T18:58:30.225Z",
    "dateReserved": "2020-05-15T00:00:00.000Z",
    "dateUpdated": "2024-09-17T03:03:38.846Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-12892 (GCVE-0-2020-12892)

Vulnerability from cvelistv5 – Published: 2021-11-15 18:39 – Updated: 2024-09-16 17:34
VLAI?
Summary
An untrusted search path in AMD Radeon settings Installer may lead to a privilege escalation or unauthorized code execution.
Severity ?
No CVSS data available.
CWE
  • NA
Assigner
AMD
References
Impacted products
Vendor Product Version
AMD AMD Radeon Software Affected: Radeon Software , < 21.3.1 (custom)
Affected: Radeon Pro Software for Enterprise , < 21.Q2 (custom)
Create a notification for this product.
Date Public ?
2021-11-09 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:19.033Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD Radeon Software",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "21.3.1",
              "status": "affected",
              "version": "Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "21.Q2",
              "status": "affected",
              "version": "Radeon Pro Software for Enterprise",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "An untrusted search path in AMD Radeon settings Installer may lead to a privilege escalation or unauthorized code execution."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "NA",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-12-27T18:14:38.000Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1000",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2020-12892",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AMD Radeon Software",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Software",
                            "version_value": "21.3.1"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Pro Software for Enterprise",
                            "version_value": "21.Q2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An untrusted search path in AMD Radeon settings Installer may lead to a privilege escalation or unauthorized code execution."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "NA"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1000",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12892",
    "datePublished": "2021-11-15T18:39:47.290Z",
    "dateReserved": "2020-05-15T00:00:00.000Z",
    "dateUpdated": "2024-09-16T17:34:18.633Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-12963 (GCVE-0-2020-12963)

Vulnerability from cvelistv5 – Published: 2021-11-15 15:58 – Updated: 2024-09-16 22:45
VLAI?
Summary
An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows may allow unprivileged users to compromise the system.
Severity ?
No CVSS data available.
CWE
  • NA
Assigner
AMD
References
Impacted products
Vendor Product Version
AMD AMD Radeon Software Affected: Radeon Software , < 20.11.2 (custom)
Affected: Radeon Pro Software for Enterprise , < 21.Q2 (custom)
Create a notification for this product.
Date Public ?
2021-11-09 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:18.216Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD Radeon Software",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "20.11.2",
              "status": "affected",
              "version": "Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "21.Q2",
              "status": "affected",
              "version": "Radeon Pro Software for Enterprise",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows may allow unprivileged users to compromise the system."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "NA",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-12-27T18:14:56.000Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1000",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2020-12963",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AMD Radeon Software",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Software",
                            "version_value": "20.11.2"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Pro Software for Enterprise",
                            "version_value": "21.Q2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows may allow unprivileged users to compromise the system."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "NA"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1000",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12963",
    "datePublished": "2021-11-15T15:58:06.272Z",
    "dateReserved": "2020-05-15T00:00:00.000Z",
    "dateUpdated": "2024-09-16T22:45:17.132Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-12895 (GCVE-0-2020-12895)

Vulnerability from cvelistv5 – Published: 2021-11-15 15:56 – Updated: 2024-09-16 22:02
VLAI?
Summary
Pool/Heap Overflow in AMD Graphics Driver for Windows 10 in Escape 0x110037 may lead to escalation of privilege, information disclosure or denial of service.
Severity ?
No CVSS data available.
CWE
  • NA
Assigner
AMD
References
Impacted products
Vendor Product Version
AMD AMD Radeon Software Affected: Radeon Software , < 20.11.2 (custom)
Affected: Radeon Pro Software for Enterprise , < 21.Q2 (custom)
Create a notification for this product.
Date Public ?
2021-11-09 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:18.755Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD Radeon Software",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "20.11.2",
              "status": "affected",
              "version": "Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "21.Q2",
              "status": "affected",
              "version": "Radeon Pro Software for Enterprise",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Pool/Heap Overflow in AMD Graphics Driver for Windows 10 in Escape 0x110037 may lead to escalation of privilege, information disclosure or denial of service."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "NA",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-12-27T18:14:44.000Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1000",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2020-12895",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AMD Radeon Software",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Software",
                            "version_value": "20.11.2"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Pro Software for Enterprise",
                            "version_value": "21.Q2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Pool/Heap Overflow in AMD Graphics Driver for Windows 10 in Escape 0x110037 may lead to escalation of privilege, information disclosure or denial of service."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "NA"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1000",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12895",
    "datePublished": "2021-11-15T15:56:00.755Z",
    "dateReserved": "2020-05-15T00:00:00.000Z",
    "dateUpdated": "2024-09-16T22:02:20.505Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-12929 (GCVE-0-2020-12929)

Vulnerability from cvelistv5 – Published: 2021-11-15 15:52 – Updated: 2024-09-17 02:00
VLAI?
Summary
Improper parameters validation in some trusted applications of the PSP contained in the AMD Graphics Driver may allow a local attacker to bypass security restrictions and achieve arbitrary code execution .
Severity ?
No CVSS data available.
CWE
  • NA
Assigner
AMD
References
Impacted products
Vendor Product Version
AMD AMD Radeon Software Affected: Radeon Software , < 20.11.2 (custom)
Affected: Radeon Pro Software for Enterprise , < 21.Q2 (custom)
Create a notification for this product.
Date Public ?
2021-11-09 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:18.216Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD Radeon Software",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "20.11.2",
              "status": "affected",
              "version": "Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "21.Q2",
              "status": "affected",
              "version": "Radeon Pro Software for Enterprise",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper parameters validation in some trusted applications of the PSP contained in the AMD Graphics Driver may allow a local attacker to bypass security restrictions and achieve arbitrary code execution ."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "NA",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-12-27T18:14:51.000Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1000",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2020-12929",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AMD Radeon Software",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Software",
                            "version_value": "20.11.2"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Pro Software for Enterprise",
                            "version_value": "21.Q2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper parameters validation in some trusted applications of the PSP contained in the AMD Graphics Driver may allow a local attacker to bypass security restrictions and achieve arbitrary code execution ."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "NA"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1000",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12929",
    "datePublished": "2021-11-15T15:52:18.454Z",
    "dateReserved": "2020-05-15T00:00:00.000Z",
    "dateUpdated": "2024-09-17T02:00:49.330Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}