Lucene search

K
amdAmd.comAMD-SB-6012
HistoryApr 09, 2024 - 12:00 a.m.

Radeon™ Driver for DirectX® 11 Shader Vulnerabilities

2024-04-0900:00:00
amd.com
www.amd.com
2
amd
cisco talos
arbitrary code execution
user mode driver

5.3 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

7.6 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.1%

**AMD ID:**AMD-SB-6012 **Potential Impact:**Arbitrary Code Execution Severity: High

Summary

AMD has received a report from a researcher at Cisco Talos detailing two arbitrary write vulnerabilities in the AMD Radeon™ user mode driver for DirectX® 11.

5.3 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

7.6 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.1%

Related for AMD-SB-6012