2024-07-14 02:06:08 +00:00

25 lines
1.7 KiB
JSON

{
"id": "CVE-2023-47252",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-26T03:15:06.617",
"lastModified": "2024-04-26T12:58:17.720",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in PnpSmm in Insyde InsydeH2O with kernel 5.0 through 5.6. There is a possible out-of-bounds access in the SMM communication buffer, leading to tampering. The PNP-related SMI sub-functions do not verify data size before getting it from the communication buffer, which could lead to possible circumstances where the data immediately following the command buffer could be destroyed with a fixed value. This is fixed in kernel 5.2 v05.28.45, kernel 5.3 v05.37.45, kernel 5.4 v05.45.45, kernel 5.5 v05.53.45, and kernel 5.6 v05.60.45."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en PnpSmm en Insyde InsydeH2O con kernel 5.0 a 5.6. Existe un posible acceso fuera de los l\u00edmites en el b\u00fafer de comunicaci\u00f3n SMM, lo que lleva a una manipulaci\u00f3n. Las subfunciones SMI relacionadas con PNP no verifican el tama\u00f1o de los datos antes de obtenerlos del b\u00fafer de comunicaci\u00f3n, lo que podr\u00eda llevar a posibles circunstancias en las que los datos que siguen inmediatamente al b\u00fafer de comando podr\u00edan destruirse con un valor fijo. Esto se solucion\u00f3 en el kernel 5.2 v05.28.45, el kernel 5.3 v05.37.45, el kernel 5.4 v05.45.45, el kernel 5.5 v05.53.45 y el kernel 5.6 v05.60.45."
}
],
"metrics": {},
"references": [
{
"url": "https://www.insyde.com/security-pledge/SA-2023067",
"source": "cve@mitre.org"
}
]
}