cvelist/2021/33xxx/CVE-2021-33626.json

80 lines
2.6 KiB
JSON
Raw Normal View History

2021-05-28 13:00:47 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
2021-10-01 03:00:58 +00:00
"ID": "CVE-2021-33626",
"STATE": "PUBLIC"
2021-05-28 13:00:47 +00:00
},
2021-10-01 03:00:58 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2021-05-28 13:00:47 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2022-02-03 00:01:05 +00:00
"value": "A vulnerability exists in SMM (System Management Mode) branch that registers a SWSMI handler that does not sufficiently check or validate the allocated buffer pointer(QWORD values for CommBuffer). This can be used by an attacker to corrupt data in SMRAM memory and even lead to arbitrary code execution."
2021-05-28 13:00:47 +00:00
}
]
2021-10-01 03:00:58 +00:00
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
2022-02-03 00:01:05 +00:00
{
"url": "https://www.insyde.com/security-pledge",
"refsource": "MISC",
"name": "https://www.insyde.com/security-pledge"
},
2021-10-01 03:00:58 +00:00
{
"refsource": "MISC",
"name": "https://www.insyde.com/security-pledge/SA-2021001",
"url": "https://www.insyde.com/security-pledge/SA-2021001"
2022-02-17 01:01:11 +00:00
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20220216-0006/",
"url": "https://security.netapp.com/advisory/ntap-20220216-0006/"
2022-02-24 15:02:06 +00:00
},
{
"refsource": "CONFIRM",
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf"
2021-10-01 03:00:58 +00:00
}
]
},
"source": {
"discovery": "INTERNAL"
2021-05-28 13:00:47 +00:00
}
}