Improper input and range checking in the AMD Secure Processor (ASP) boot loader image header may allow an attacker to use attacker-controlled values prior to signature validation potentially resulting in arbitrary code execution.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Epyc_7003_firmware | Amd | * | milanpi-sp3_1.0.0.4 (excluding) |