{ "id": "CVE-2020-6100", "sourceIdentifier": "talos-cna@cisco.com", "published": "2020-07-20T21:15:12.733", "lastModified": "2024-11-21T05:35:05.793", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An exploitable memory corruption vulnerability exists in AMD atidxx64.dll 26.20.15019.19000 graphics driver. A specially crafted pixel shader can cause memory corruption vulnerability. An attacker can provide a specially crafted shader file to trigger this vulnerability. This vulnerability potentially could be triggered from guest machines running virtualization environments (ie. VMware, qemu, VirtualBox etc.) in order to perform guest-to-host escape - as it was demonstrated before (TALOS-2018-0533, TALOS-2018-0568, etc.). Theoretically this vulnerability could be also triggered from web browser (using webGL and webassembly). This vulnerability was triggered from HYPER-V guest using RemoteFX feature leading to executing the vulnerable code on the HYPER-V host (inside of the rdvgm.exe process)." }, { "lang": "es", "value": "Se presenta una vulnerabilidad de corrupci\u00f3n de memoria explotable en el controlador de gr\u00e1ficos atidxx64.dll de AMD versi\u00f3n 26.20.15019.19000. Un sombreador de p\u00edxeles especialmente dise\u00f1ado puede causar una vulnerabilidad de corrupci\u00f3n de memoria. Un atacante puede proporcionar un archivo shader especialmente dise\u00f1ado para desencadenar esta vulnerabilidad. Esta vulnerabilidad podr\u00eda ser desencadenada potencialmente desde m\u00e1quinas invitadas que ejecutan entornos de virtualizaci\u00f3n (es decir, VMware, qemu, VirtualBox, etc.) en funci\u00f3n de llevar a cabo el escape de invitado a host, como fue demostrado antes (TALOS-2018-0533, TALOS-2018- 0568, etc.). Te\u00f3ricamente, esta vulnerabilidad podr\u00eda ser activada tambi\u00e9n desde el navegador web (usando webGL y webassembly). Esta vulnerabilidad fue desencadenada desde el invitado HYPER-V utilizando la funcionalidad RemoteFX conllevando a una ejecuci\u00f3n de c\u00f3digo vulnerable en el host HYPER-V (dentro del proceso rdvgm.exe)" } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "baseScore": 9.9, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH" }, "exploitabilityScore": 3.1, "impactScore": 6.0 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-787" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:amd:radeon_directx_11_driver_atidxx64.dll:26.20.15019.19000:*:*:*:*:*:*:*", "matchCriteriaId": "81578A1D-D11C-480F-B836-76C976B4B536" } ] } ] } ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1040", "source": "talos-cna@cisco.com", "tags": [ "Exploit", "Third Party Advisory" ] }, { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1040", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ] } ] }