First published: Wed Nov 09 2022(Updated: )
Insufficient validation in the IOCTL input/output buffer in AMD ?Prof may allow an attacker to bypass bounds checks potentially leading to a Windows kernel crash resulting in denial of service.
Credit: psirt@amd.com
Affected Software | Affected Version | How to fix |
---|---|---|
Amd Amd Uprof | <3.6.549 | |
FreeBSD FreeBSD | ||
Amd Amd Uprof | <3.6.839 | |
Microsoft Windows | ||
Amd Amd Uprof | <3.6.449 | |
Linux Linux kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-27674 is a vulnerability in AMD ?Prof that allows an attacker to bypass bounds checks potentially leading to a Windows kernel crash resulting in denial of service.
The affected software is AMD ?Prof version up to exclusive 3.6.549.
An attacker can exploit CVE-2022-27674 by bypassing bounds checks in AMD ?Prof and causing a Windows kernel crash.
The severity of CVE-2022-27674 is high with a severity value of 7.5.
You can find more information about CVE-2022-27674 on the AMD Product Security Bulletin at https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1046.