脆弱性情報
高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
脆弱性タイトル
SMM memory corruption vulnerability in OverClockSmiHandler SMM driver
脆弱性説明
An attacker can exploit this vulnerability to elevate privileges from ring 0 to ring -2, execute arbitrary code in System Management Mode - an environment more privileged than operating system (OS) and completely isolated from it. Running arbitrary code in SMM additionally bypasses SMM-based SPI flash protections against modifications, which can help an attacker to install a firmware backdoor/implant into BIOS. Such a malicious firmware code in BIOS could persist across operating system re-installs. Additionally, this vulnerability potentially could be used by malicious actors to bypass security mechanisms provided by UEFI firmware (for example, Secure Boot and some types of memory isolation for hypervisors). This issue affects: Module name: OverClockSmiHandler SHA256: a204699576e1a48ce915d9d9423380c8e4c197003baf9d17e6504f0265f3039c Module GUID: 4698C2BD-A903-410E-AD1F-5EEF3A1AE422
CVSS情報
N/A
脆弱性タイプ
未进行输入大小检查的缓冲区拷贝(传统缓冲区溢出)
脆弱性タイトル
Intel NUC M15 安全漏洞
脆弱性説明
Intel NUC M15是美国英特尔(Intel)公司的一种笔记本电脑套件。 Intel NUC M15 Laptop Kit BC0076之前版本存在安全漏洞,该漏洞源于权限提升,在系统管理模式下执行任意代码,在SMM中运行任意代码还会绕过基于SMM的SPI闪存保护以防止修改,这可以帮助攻击者将固件后门/植入物安装到BIOS中。BIOS中的此类恶意固件代码可能会在重新安装操作系统后持续存在,恶意行为者可能会利用此漏洞绕过UEFI固件提供的安全机制。
CVSS情報
N/A
脆弱性タイプ
N/A