Insufficient input validation during parsing of the System Management Mode (SMM) binary may allow a maliciously crafted SMM executable binary to corrupt Dynamic Root of Trust for Measurement (DRTM) user application memory that may result in a potential denial of service.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032 | vendor advisory |