Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2022-33982

Опубликовано: 14 нояб. 2022
Источник: nvd
CVSS3: 6.4
EPSS Низкий

Описание

DMA attacks on the parameter buffer used by the Int15ServiceSmm software SMI handler could lead to a TOCTOU attack on the SMI handler and lead to corruption of SMRAM. DMA attacks on the parameter buffer used by the software SMI handler used by the driver Int15ServiceSmm could lead to a TOCTOU attack on the SMI handler and lead to corruption of SMRAM. This issue was discovered by Insyde engineering during a security review. This issue is fixed in Kernel 5.2: 05.27.23, Kernel 5.3: 05.36.23, Kernel 5.4: 05.44.23 and Kernel 5.5: 05.52.23 CWE-367

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:insyde:kernel:*:*:*:*:*:*:*:*
Версия от 5.2 (включая) до 5.2.05.27.23 (исключая)
cpe:2.3:a:insyde:kernel:*:*:*:*:*:*:*:*
Версия от 5.3 (включая) до 5.3.05.36.23 (исключая)
cpe:2.3:a:insyde:kernel:*:*:*:*:*:*:*:*
Версия от 5.4 (включая) до 5.4.05.44.23 (исключая)
cpe:2.3:a:insyde:kernel:*:*:*:*:*:*:*:*
Версия от 5.5 (включая) до 5.5.05.52.23 (исключая)

EPSS

Процентиль: 16%
0.00052
Низкий

6.4 Medium

CVSS3

Дефекты

CWE-367
CWE-367

Связанные уязвимости

CVSS3: 6.4
github
около 3 лет назад

DMA attacks on the parameter buffer used by the Int15ServiceSmm software SMI handler could lead to a TOCTOU attack on the SMI handler and lead to corruption of SMRAM. DMA attacks on the parameter buffer used by the software SMI handler used by the driver Int15ServiceSmm could lead to a TOCTOU attack on the SMI handler and lead to corruption of SMRAM. This issue was discovered by Insyde engineering during a security review. This issue is fixed in Kernel 5.2: 05.27.23, Kernel 5.3: 05.36.23, Kernel 5.4: 05.44.23 and Kernel 5.5: 05.52.23 CWE-367

EPSS

Процентиль: 16%
0.00052
Низкий

6.4 Medium

CVSS3

Дефекты

CWE-367
CWE-367