We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-20507



Description

An integer overflow in the ASP could allow a privileged attacker to perform an out-of-bounds write, potentially resulting in loss of data integrity.

Reserved 2022-10-27 | Published 2025-02-11 | Updated 2025-02-12 | Assigner AMD


LOW: 2.3CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N

Problem types

CWE-190 Integer Overflow or Wraparound

Product status

Default status
affected

ComboAM4V2 1.2.0.A
unaffected

Default status
affected

ComboAM5 1.0.0.6
unaffected

Default status
affected

ComboAM4V2 1.2.0.A
unaffected

Default status
affected

ComboAM4V2 1.2.0.A
unaffected

Default status
affected

ComboAM5 1.0.0.6
unaffected

Default status
affected

RenoirPI-FP6 1.0.0.C
unaffected

Default status
affected

CezannePI-FP6 1.0.0.E
unaffected

Default status
affected

MendocinoPI-FT6 1.0.0.5
unaffected

Default status
affected

RembrandtPI-FP7 1.0.0.8
unaffected

Default status
affected

RembrandtPI-FP7 1.0.0.8
unaffected

Default status
affected

DragonRangeFL1 1.0.0.2b
unaffected

Default status
affected

EmbAM4PI 1.0.0.5
unaffected

Default status
affected

EmbeddedAM5PI 1.0.0.0
unaffected

Default status
affected

EmbeddedPI-FP6 1.0.0.8
unaffected

Default status
affected

EmbeddedPI-FP7r2 1.0.0.6
unaffected

References

www.amd.com/...es/product-security/bulletin/amd-sb-5004.html

www.amd.com/...es/product-security/bulletin/amd-sb-4008.html

cve.org (CVE-2023-20507)

nvd.nist.gov (CVE-2023-20507)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2023-20507

Support options

Helpdesk Chat, Email, Knowledgebase
MonTueWedThuFriSatSun
311234567891011121314151617181920212223242526272829301234567891011
MonTueWedThuFriSatSun
311234567891011121314151617181920212223242526272829301234567891011