BDU:2023-05579
Vulnerability from fstec - Published: 08.08.2023
VLAI Severity ?
Title
Уязвимость компонент CpmDisplayFeatureSmm микропрограммного обеспечения процессоров AMD, связанная с записью за границами буфера в памяти, позволяющая нарушителю выполнить произвольный код
Description
Уязвимость компонент CpmDisplayFeatureSmm микропрограммного обеспечения процессоров AMD связана с записью за границами буфера в памяти. Эксплуатация уязвимости может позволить нарушителю выполнить произвольный код
Severity ?
Vendor
Advanced Micro Devices Inc.
Software Name
AMD Ryzen 3000 Series Desktop Processors Matisse AM4, AMD Ryzen 5000 Series Desktop Processors Vermeer AM4, AMD Ryzen 7000 Series Processors Raphael, AMD Athlon 3000 Series Desktop Processors with Radeon Graphics Picasso, AMD Ryzen 4000 Series Desktop Processors with Radeon Graphics Renoir FP5, AMD Athlon 3000 Series Mobile Processors with Radeon Graphics Dali, AMD Athlon 3000 Series Mobile Processors with Radeon Graphics Dali FP5, AMD Athlon 3000 Series Mobile Processors with Radeon Graphics Pollock, AMD Ryzen 3000 Series Mobile Processors with Radeon Graphics Picasso, AMD Ryzen 4000 Series Mobile Processors with Radeon Graphics Renoir FP6, AMD Ryzen 5000 Series Mobile Processors with Radeon Graphics Lucienne, AMD Ryzen 5000 Series Mobile Processors with Radeon Graphics Cezanne, AMD Ryzen 6000 Series Mobile Processors Rembrandt, AMD Ryzen 7030 Series Mobile Processors Barcelo, AMD Ryzen 7020 Series Mobile Processors Mendocino
Software Version
до ComboAM4 PI V1 1.0.0.A (AMD Ryzen 3000 Series Desktop Processors Matisse AM4), до ComboAM4V2 PI 1.2.0.A (AMD Ryzen 3000 Series Desktop Processors Matisse AM4), до ComboAM4 V2 PI 1.2.0.A (AMD Ryzen 5000 Series Desktop Processors Vermeer AM4), до ComboAM5 1.0.0.6 (AMD Ryzen 7000 Series Processors Raphael), до ComboAM4PIv1 1.0.0.A (AMD Athlon 3000 Series Desktop Processors with Radeon Graphics Picasso), до ComboAM4V2 1.2.0.A (AMD Athlon 3000 Series Desktop Processors with Radeon Graphics Picasso), до ComboAM4V2 1.2.0.A (AMD Ryzen 4000 Series Desktop Processors with Radeon Graphics Renoir FP5), до PicassoPI-FP5 1.0.0.F (AMD Athlon 3000 Series Mobile Processors with Radeon Graphics Dali), до PicassoPI-FP5 1.0.0.F (AMD Athlon 3000 Series Mobile Processors with Radeon Graphics Dali FP5), до PollockPI-FT5 1.0.0.5 (AMD Athlon 3000 Series Mobile Processors with Radeon Graphics Pollock), до PicassoPI-FP5 1.0.0.F (AMD Ryzen 3000 Series Mobile Processors with Radeon Graphics Picasso), до RenoirPI-FP6 1.0.0.B (AMD Ryzen 4000 Series Mobile Processors with Radeon Graphics Renoir FP6), до CezannePI-FP6 1.0.0.E (AMD Ryzen 5000 Series Mobile Processors with Radeon Graphics Lucienne), до CezannePI-FP6 1.0.0.E (AMD Ryzen 5000 Series Mobile Processors with Radeon Graphics Cezanne), до RembrandtPI-FP7 1.0.0.8 (AMD Ryzen 6000 Series Mobile Processors Rembrandt), до CezannePI-FP6 1.0.0.E (AMD Ryzen 7030 Series Mobile Processors Barcelo), до MendocinoPI-FT6 1.0.0.5 (AMD Ryzen 7020 Series Mobile Processors Mendocino)
Possible Mitigations
Использование рекомендаций:
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4003
Reference
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4003
https://nvd.nist.gov/vuln/detail/CVE-2023-20555
CWE
CWE-787
{
"CVSS 2.0": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS 3.0": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Advanced Micro Devices Inc.",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "\u0434\u043e ComboAM4 PI V1 1.0.0.A (AMD Ryzen 3000 Series Desktop Processors Matisse AM4), \u0434\u043e ComboAM4V2 PI 1.2.0.A (AMD Ryzen 3000 Series Desktop Processors Matisse AM4), \u0434\u043e ComboAM4 V2 PI 1.2.0.A (AMD Ryzen 5000 Series Desktop Processors Vermeer AM4), \u0434\u043e ComboAM5 1.0.0.6 (AMD Ryzen 7000 Series Processors Raphael), \u0434\u043e ComboAM4PIv1 1.0.0.A (AMD Athlon 3000 Series Desktop Processors with Radeon Graphics Picasso), \u0434\u043e ComboAM4V2 1.2.0.A (AMD Athlon 3000 Series Desktop Processors with Radeon Graphics Picasso), \u0434\u043e ComboAM4V2 1.2.0.A (AMD Ryzen 4000 Series Desktop Processors with Radeon Graphics Renoir FP5), \u0434\u043e PicassoPI-FP5 1.0.0.F (AMD Athlon 3000 Series Mobile Processors with Radeon Graphics Dali), \u0434\u043e PicassoPI-FP5 1.0.0.F (AMD Athlon 3000 Series Mobile Processors with Radeon Graphics Dali FP5), \u0434\u043e PollockPI-FT5 1.0.0.5 (AMD Athlon 3000 Series Mobile Processors with Radeon Graphics Pollock), \u0434\u043e PicassoPI-FP5 1.0.0.F (AMD Ryzen 3000 Series Mobile Processors with Radeon Graphics Picasso), \u0434\u043e RenoirPI-FP6 1.0.0.B (AMD Ryzen 4000 Series Mobile Processors with Radeon Graphics Renoir FP6), \u0434\u043e CezannePI-FP6 1.0.0.E (AMD Ryzen 5000 Series Mobile Processors with Radeon Graphics Lucienne), \u0434\u043e CezannePI-FP6 1.0.0.E (AMD Ryzen 5000 Series Mobile Processors with Radeon Graphics Cezanne), \u0434\u043e RembrandtPI-FP7 1.0.0.8 (AMD Ryzen 6000 Series Mobile Processors Rembrandt), \u0434\u043e CezannePI-FP6 1.0.0.E (AMD Ryzen 7030 Series Mobile Processors Barcelo), \u0434\u043e MendocinoPI-FT6 1.0.0.5 (AMD Ryzen 7020 Series Mobile Processors Mendocino)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\nhttps://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4003",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "08.08.2023",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "14.09.2023",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "14.09.2023",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2023-05579",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2023-20555",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "AMD Ryzen 3000 Series Desktop Processors Matisse AM4, AMD Ryzen 5000 Series Desktop Processors Vermeer AM4, AMD Ryzen 7000 Series Processors Raphael, AMD Athlon 3000 Series Desktop Processors with Radeon Graphics Picasso, AMD Ryzen 4000 Series Desktop Processors with Radeon Graphics Renoir FP5, AMD Athlon 3000 Series Mobile Processors with Radeon Graphics Dali, AMD Athlon 3000 Series Mobile Processors with Radeon Graphics Dali FP5, AMD Athlon 3000 Series Mobile Processors with Radeon Graphics Pollock, AMD Ryzen 3000 Series Mobile Processors with Radeon Graphics Picasso, AMD Ryzen 4000 Series Mobile Processors with Radeon Graphics Renoir FP6, AMD Ryzen 5000 Series Mobile Processors with Radeon Graphics Lucienne, AMD Ryzen 5000 Series Mobile Processors with Radeon Graphics Cezanne, AMD Ryzen 6000 Series Mobile Processors Rembrandt, AMD Ryzen 7030 Series Mobile Processors Barcelo, AMD Ryzen 7020 Series Mobile Processors Mendocino",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442 CpmDisplayFeatureSmm \u043c\u0438\u043a\u0440\u043e\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u043e\u0432 AMD, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u0437\u0430\u043f\u0438\u0441\u044c\u044e \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u0430\u043c\u0438 \u0431\u0443\u0444\u0435\u0440\u0430 \u0432 \u043f\u0430\u043c\u044f\u0442\u0438, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0417\u0430\u043f\u0438\u0441\u044c \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u0430\u043c\u0438 \u0431\u0443\u0444\u0435\u0440\u0430 (CWE-787)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442 CpmDisplayFeatureSmm \u043c\u0438\u043a\u0440\u043e\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u043e\u0432 AMD \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0437\u0430\u043f\u0438\u0441\u044c\u044e \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u0430\u043c\u0438 \u0431\u0443\u0444\u0435\u0440\u0430 \u0432 \u043f\u0430\u043c\u044f\u0442\u0438. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4003\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-20555",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041c\u0438\u043a\u0440\u043e\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0439 \u043a\u043e\u0434",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-787",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,8)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,8)"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…