2024-08-13 18:03:14 +00:00
{
"id" : "CVE-2023-31366" ,
"sourceIdentifier" : "psirt@amd.com" ,
"published" : "2024-08-13T17:15:21.913" ,
2024-12-12 03:04:10 +00:00
"lastModified" : "2024-12-12T01:21:40.487" ,
"vulnStatus" : "Modified" ,
2024-08-13 18:03:14 +00:00
"cveTags" : [ ] ,
"descriptions" : [
{
"lang" : "en" ,
2024-12-12 03:04:10 +00:00
"value" : "Improper input validation in AMD \u03bcProf could allow an attacker to perform a write to an invalid address, potentially resulting in denial of service."
2024-08-14 18:03:14 +00:00
} ,
{
"lang" : "es" ,
"value" : "Una validaci\u00f3n de entrada incorrecta en AMD ?Prof podr\u00eda permitir que un atacante realice una escritura en una direcci\u00f3n no v\u00e1lida, lo que podr\u00eda resultar en una denegaci\u00f3n de servicio."
2024-08-13 18:03:14 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "psirt@amd.com" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" ,
2024-12-03 19:03:35 +00:00
"baseScore" : 3.3 ,
"baseSeverity" : "LOW" ,
2024-08-13 18:03:14 +00:00
"attackVector" : "LOCAL" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
2024-12-03 19:03:35 +00:00
"availabilityImpact" : "LOW"
2024-08-13 18:03:14 +00:00
} ,
"exploitabilityScore" : 1.8 ,
"impactScore" : 1.4
2024-12-03 19:03:35 +00:00
} ,
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" ,
"baseScore" : 5.5 ,
"baseSeverity" : "MEDIUM" ,
"attackVector" : "LOCAL" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "HIGH"
} ,
"exploitabilityScore" : 1.8 ,
"impactScore" : 3.6
2024-08-13 18:03:14 +00:00
}
]
} ,
"weaknesses" : [
{
"source" : "psirt@amd.com" ,
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-20"
}
]
2024-12-03 19:03:35 +00:00
} ,
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-noinfo"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:amd:uprof:*:*:*:*:*:linux:*:*" ,
"versionEndExcluding" : "4.1.424" ,
"matchCriteriaId" : "4B13FA61-9E51-45AF-A0F8-0C3A518B390A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:amd:uprof:*:*:*:*:*:freebsd:*:*" ,
"versionEndExcluding" : "4.2.816" ,
"matchCriteriaId" : "50D6F227-1657-451F-AF90-A68B6A4BF03A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:amd:uprof:*:*:*:*:*:windows:*:*" ,
"versionEndExcluding" : "4.2.845" ,
"matchCriteriaId" : "E175F21E-6872-42B1-8C4C-6B473440EE12"
}
]
}
]
2024-08-13 18:03:14 +00:00
}
] ,
"references" : [
{
"url" : "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-9001" ,
2024-12-03 19:03:35 +00:00
"source" : "psirt@amd.com" ,
"tags" : [
"Vendor Advisory"
]
2024-08-13 18:03:14 +00:00
}
]
}