exploit the possibilities
Showing 1 - 13 of 13 RSS Feed

Files

AMD Secure Encrypted Virtualization (SEV) Key Recovery
Posted Jun 26, 2019
Authored by Google Security Research, Cfir Cohen

AMD Secure Encrypted Virtualization (SEV) is a hardware memory encryption feature. SEV protects guest virtual machines from the hypervisor, provides confidentiality guarantees at runtime and remote attestation at launch time. The SEV elliptic-curve (ECC) implementation was found to be vulnerable to an invalid curve attack. At launch-start command, an attacker can send small order ECC points not on the official NIST curves, and force the SEV firmware to multiply a small order point by the firmware's private DH scalar. By collecting enough modular residues, an attacker can recover the complete PDH private key. With the PDH, an attacker can recover the session key and the VM's launch secret. This breaks the confidentiality guarantees offered by SEV.

tags | advisory, remote
advisories | CVE-2019-9836
MD5 | 559575654f299416a1c983c68aaf13ba

Related Files

AMD Fuel Service Unquoted Service Path
Posted Feb 6, 2021
Authored by Hector Gerbacio

AMD Fuel Service suffers from an unquoted service path vulnerability.

tags | exploit
MD5 | cb85eba395b353af8325369a93db4168
AMD Radeon DirectX 11 Driver 8.17.10.0871 Memory Corruption
Posted Apr 23, 2020
Authored by Marcin Ressel

AMD Radeon DirectX 11 Driver version 8.17.10.0871 suffers from a memory corruption vulnerability.

tags | exploit
MD5 | 1995bb7b4e0a66699c00de7295d52541
AMD Plays.tv 1.27.5.0 Arbitrary File Execution
Posted Apr 15, 2018
Authored by Securifera

AMD Plays.tv version 1.27.5.0 suffers from a plays_service.exe arbitrary file execution vulnerability.

tags | exploit, arbitrary
advisories | CVE-2018-6546
MD5 | 4390d9f83268fb995b08b3163d9ef4f4
AMD PSP fTPM Remote Code Execution
Posted Jan 6, 2018
Authored by Google Security Research, Cfir Cohen

AMD PSP suffers from an fTPM remote code execution vulnerability that can be performed through a crafted EK certificate.

tags | advisory, remote, overflow, code execution
MD5 | 49627edce894ee302ff8f2fcf54e0f53
AMD fglrx-driver 14.4.2 Privilege Escalation
Posted Oct 29, 2015
Authored by Tim Brown | Site portcullis-security.com

Privilege escalation can be achieved via a symlink attack on POSIX shared memory with insecure permission in AMD fglrx-driver version 14.4.2.

tags | advisory
advisories | CVE-2015-7723
MD5 | af168e7674aa3ddcd91f2741d2711c3d
AMD fglrx-driver 15.7 Privilege Escalation
Posted Oct 29, 2015
Authored by Tim Brown | Site portcullis-security.com

Privilege escalation can be achieved via a symlink attack on POSIX shared memory with insecure permission in AMD fglrx-driver version 15.7.

tags | advisory
advisories | CVE-2015-7724
MD5 | 0ebfe857657e6659feb58180ca053e66
AMDSoft Aboutus.aspx Cross Site Scripting
Posted Jun 19, 2011
Authored by Bl4ck.Viper

AMDSoft Aboutus.aspx suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | e326574c166f6b73159ddfc738234aaf
amd-ex.c
Posted Nov 17, 2002

AMD remote exploit that uses the amq binary.

tags | exploit, remote
MD5 | 6eb651f99ca224a21516cffc64b70a50
amd.tgz
Posted Feb 8, 2000
Authored by Lamagra | Site lamagra.seKure.de

rpc.amd remote exploit with spoofed source address.

tags | exploit, remote, spoof
MD5 | 4462341eb48280d65c66e69f1770aebf
amdscan.c
Posted Oct 20, 1999

AMD (amd V1) Automountd tiny Scanner by Bjunk. Works on a single host or a class C network.

tags | tool, scanner
systems | unix
MD5 | 7b01fbf8b8546ab0de4a4eaa1d736504
amdscanner.tar.gz
Posted Oct 12, 1999
Authored by Vetesgirl

Automount (amd) vulnerability scanner.

tags | tool, scanner
systems | unix
MD5 | f6bfd4bf8e46ab0254c35f6cfeb5e888
amd.patch
Posted Sep 28, 1999

Patch for amd. Prevent remote users from executing arbitrary code as root in the amd daemon context.

tags | exploit, remote, arbitrary, root
MD5 | db89c88a0310e15336340d4ccb2d909e
amd_exploit.txt
Posted Sep 19, 1999

SDI AMD remote exploit for Red Hat linux

tags | exploit, remote
systems | linux, redhat
MD5 | 12f5eb74990c34a11ea4f45cfee88cac
Page 1 of 1
Back1Next

File Archive:

May 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    1 Files
  • 2
    May 2nd
    4 Files
  • 3
    May 3rd
    27 Files
  • 4
    May 4th
    17 Files
  • 5
    May 5th
    3 Files
  • 6
    May 6th
    32 Files
  • 7
    May 7th
    11 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close