Show plain JSON{"id": "CVE-2022-32266", "cveTags": [], "metrics": {"cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 6.4, "attackVector": "LOCAL", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "HIGH", "privilegesRequired": "HIGH", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 0.5}]}, "published": "2022-11-14T22:15:13.527", "references": [{"url": "https://www.insyde.com/security-pledge", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "https://www.insyde.com/security-pledge/SA-2022045", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}], "vulnStatus": "Analyzed", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-787"}]}], "descriptions": [{"lang": "en", "value": "DMA attacks on the parameter buffer used by a software SMI handler used by the driver PcdSmmDxe could lead to a TOCTOU attack on the SMI handler and lead to corruption of other ACPI fields and adjacent memory fields. DMA attacks on the parameter buffer used by a software SMI handler used by the driver PcdSmmDxe could lead to a TOCTOU attack on the SMI handler and lead to corruption of other ACPI fields and adjacent memory fields. The attack would require detailed knowledge of the PCD database contents on the current platform. This issue was discovered by Insyde engineering during a security review. This issue is fixed in Kernel 5.3: 05.36.23, Kernel 5.4: 05.44.23, Kernel 5.5: 05.52.23. Kernel 5.2 is unaffected. CWE-787 An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. DMA attacks on the parameter buffer that is used by a software SMI handler (used by the PcdSmmDxe driver) could lead to a TOCTOU race-condition attack on the SMI handler, and lead to corruption of other ACPI fields and adjacent memory fields. The attack would require detailed knowledge of the PCD database contents on the current platform."}, {"lang": "es", "value": "Los ataques DMA al b\u00fafer de par\u00e1metros utilizado por un controlador SMI de software utilizado por el controlador PcdSmmDxe podr\u00edan provocar un ataque TOCTOU al controlador SMI y provocar la corrupci\u00f3n de otros campos ACPI y campos de memoria adyacentes. \nLos ataques DMA al b\u00fafer de par\u00e1metros utilizado por un controlador SMI de software utilizado por el controlador PcdSmmDxe podr\u00edan provocar un ataque TOCTOU al controlador SMI y provocar la corrupci\u00f3n de otros campos ACPI y campos de memoria adyacentes.\nEl ataque requerir\u00eda un conocimiento detallado del contenido de la base de datos PCD en la plataforma actual. Este problema fue descubierto por la ingenier\u00eda de Insyde durante una revisi\u00f3n de seguridad. Este problema se solucion\u00f3 en: \nKernel 5.3: 05.36.23\nKernel 5.4: 05.44.23\nKernel 5.5: 05.52.23.\nEl kernel 5.2 no se ve afectado.\nCWE-787 Se descubri\u00f3 un problema en Insyde InsydeH2O con el kernel 5.0 a 5.5. Los ataques DMA al b\u00fafer de par\u00e1metros que utiliza un controlador SMI de software (usado por el controlador PcdSmmDxe) podr\u00edan provocar un ataque de condici\u00f3n de ejecuci\u00f3n TOCTOU en el controlador SMI y provocar la corrupci\u00f3n de otros campos ACPI y campos de memoria adyacentes. El ataque requerir\u00eda un conocimiento detallado del contenido de la base de datos PCD en la plataforma actual."}], "lastModified": "2023-08-08T14:22:24.967", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:insyde:kernel:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B164BDEE-BE93-4EB5-89E7-AB2D63512CA6", "versionEndExcluding": "5.3.05.36.23", "versionStartIncluding": "5.3"}, {"criteria": "cpe:2.3:a:insyde:kernel:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A5CC2DFA-DE56-4615-8F35-84F3ACD3B541", "versionEndExcluding": "5.4.05.44.23", "versionStartIncluding": "5.4"}, {"criteria": "cpe:2.3:a:insyde:kernel:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9786B2BB-8754-4BA4-868E-FA2468D13AD2", "versionEndExcluding": "5.5.05.52.23", "versionStartIncluding": "5.5"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}