ePrivacy and GPDR Cookie Consent by Cookie Consent
AMD ATIDXX64.DLL 26.20.13025.10004 Pixel Shader Out-of-Bounds denial of service – Digitalmunition




Exploit/Advisories Cybersecurity study of the dark web exposes vulnerability to machine identities -- ScienceDaily

Published on January 26th, 2020 📆 | 5946 Views ⚑

0

AMD ATIDXX64.DLL 26.20.13025.10004 Pixel Shader Out-of-Bounds denial of service

CVSS Meta Temp ScoreCurrent Exploit Price (≈)CTI Interest Score
3.5$0-$5k5.11

A vulnerability, which was classified as problematic, has been found in AMD ATIDXX64.DLL 26.20.13025.10004. This issue affects an unknown functionality of the component Pixel Shader. The manipulation with an unknown input leads to a denial of service vulnerability (Out-of-Bounds). Using CWE to declare the problem leads to CWE-119. Impacted is availability.

The weakness was shared 01/25/2020. The identification of this vulnerability is CVE-2019-5146 since 01/04/2019. The technical details are unknown and an exploit is not publicly available.

There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.

The entries 149341, 149340 and 149338 are related to this item.

Vendor

Name

VulDB Meta Base Score: 3.5
VulDB Meta Temp Score: 3.5

VulDB Base Score: ≈3.5
VulDB Temp Score: ≈3.5
VulDB Vector: 🔒
VulDB Reliability: 🔍

VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍
Class: Denial of service / Out-of-Bounds (CWE-119)
Local: Yes
Remote: No

Availability: 🔒
Status: Not defined

Price Prediction: 🔍
Current Price Estimation: 🔒

Threat Intelligenceinfoedit

Threat: 🔍
Adversaries: 🔍
Geopolitics: 🔍
Economy: 🔍
Predictions: 🔍
Remediation: 🔍Recommended: no mitigation known

0-Day Time: 🔒

01/04/2019 CVE assigned
01/25/2020 +386 days Advisory disclosed
01/25/2020 +0 days VulDB entry created
01/25/2020 +0 days VulDB last update
CVE: CVE-2019-5146 (🔒)
See also: 🔒Created: 01/25/2020 09:54 PM
Complete: 🔍

Download it now for free!

https://vuldb.com/?id.149339

Tagged with:



Leave a Reply

Your email address will not be published. Required fields are marked *


loading...