First published: Mon Jul 20 2020(Updated: )
An exploitable memory corruption vulnerability exists in AMD atidxx64.dll 26.20.15019.19000 graphics driver. A specially crafted pixel shader can cause memory corruption vulnerability. An attacker can provide a specially crafted shader file to trigger this vulnerability. This vulnerability potentially could be triggered from guest machines running virtualization environments (ie. VMware, qemu, VirtualBox etc.) in order to perform guest-to-host escape - as it was demonstrated before (TALOS-2018-0533, TALOS-2018-0568, etc.). Theoretically this vulnerability could be also triggered from web browser (using webGL and webassembly). This vulnerability was triggered from HYPER-V guest using RemoteFX feature leading to executing the vulnerable code on the HYPER-V host (inside of the rdvgm.exe process).
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
AMD Radeon DirectX 11 Driver atidxx64.dll | =26.20.15019.19000 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-6100 is an exploitable memory corruption vulnerability in AMD atidxx64.dll 26.20.15019.19000 graphics driver.
CVE-2020-6100 can be exploited by an attacker who provides a specially crafted shader file, potentially leading to memory corruption in your system.
CVE-2020-6100 has a severity rating of 9.9 (Critical).
AMD Radeon DirectX 11 Driver atidxx64.dll version 26.20.15019.19000 is affected by CVE-2020-6100.
To mitigate CVE-2020-6100, it is recommended to apply the latest security patches and updates provided by AMD.