Insufficient bounds checking in the ASP (AMD Secure Processor) may allow an attacker to access memory outside the bounds of what is permissible to a TA (Trusted Application) resulting in a potential denial of service.
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
Link | Tags |
---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003 | vendor advisory |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html | vendor advisory |