2024-11-27 17:03:32 +00:00

129 lines
3.8 KiB
JSON

{
"id": "CVE-2024-21937",
"sourceIdentifier": "psirt@amd.com",
"published": "2024-11-12T18:15:17.863",
"lastModified": "2024-11-27T16:20:37.073",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect default permissions in the AMD HIP SDK installation directory could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution."
},
{
"lang": "es",
"value": "Los permisos predeterminados incorrectos en el directorio de instalaci\u00f3n del SDK AMD HIP podr\u00edan permitir que un atacante logre una escalada de privilegios que potencialmente resulte en la ejecuci\u00f3n de c\u00f3digo arbitrario."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@amd.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.3,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@amd.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*",
"versionEndExcluding": "24.6.1",
"matchCriteriaId": "8B95FEA4-F26E-45B0-9663-CF6730DB8400"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:cloud:*:*:*",
"versionEndExcluding": "24.7.1",
"matchCriteriaId": "D3C200C2-56EB-4CD0-9EBF-D8D3BFE51CA5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*",
"versionEndExcluding": "24.q2",
"matchCriteriaId": "3C8C56D8-EA82-4166-AC00-A8416DA471FC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:amd:radeon_software_for_hip:*:*:*:*:pro:*:*:*",
"versionEndExcluding": "24.10.16",
"matchCriteriaId": "CB85FB48-9901-49CC-A2AA-47AFC6B134B4"
}
]
}
]
}
],
"references": [
{
"url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6015.html",
"source": "psirt@amd.com",
"tags": [
"Vendor Advisory"
]
}
]
}