First published: Tue Jan 10 2023(Updated: )
Insufficient input validation during parsing of the System Management Mode (SMM) binary may allow a maliciously crafted SMM executable binary to corrupt Dynamic Root of Trust for Measurement (DRTM) user application memory that may result in a potential denial of service.
Credit: psirt@amd.com
Affected Software | Affected Version | How to fix |
---|---|---|
Amd Milanpi Firmware | <1.0.0.3 | |
Amd Milanpi |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-46791 is a vulnerability that allows a maliciously crafted System Management Mode (SMM) binary to corrupt Dynamic Root of Trust for Measurement (DRTM) user application memory, potentially resulting in a denial of service.
The Amd Milanpi Firmware version up to 1.0.0.3 is affected by CVE-2021-46791.
CVE-2021-46791 has a severity rating of medium (5.5).
To fix CVE-2021-46791, update your Amd Milanpi Firmware to a version that is not vulnerable.
You can find more information about CVE-2021-46791 in the AMD Product Security Bulletin: [https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032](https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032)