Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2v8q-5wcx-2f5j

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

In the AMD SEV/SEV-ES feature, memory can be rearranged in the guest address space that is not detected by the attestation mechanism which could be used by a malicious hypervisor to potentially lead to arbitrary code execution within the guest VM if a malicious administrator has access to compromise the server hypervisor.

In the AMD SEV/SEV-ES feature, memory can be rearranged in the guest address space that is not detected by the attestation mechanism which could be used by a malicious hypervisor to potentially lead to arbitrary code execution within the guest VM if a malicious administrator has access to compromise the server hypervisor.

EPSS

Процентиль: 79%
0.01283
Низкий

Дефекты

CWE-77

Связанные уязвимости

CVSS3: 7.2
nvd
больше 4 лет назад

In the AMD SEV/SEV-ES feature, memory can be rearranged in the guest address space that is not detected by the attestation mechanism which could be used by a malicious hypervisor to potentially lead to arbitrary code execution within the guest VM if a malicious administrator has access to compromise the server hypervisor.

EPSS

Процентиль: 79%
0.01283
Низкий

Дефекты

CWE-77