{ "schema_version": "1.4.0", "id": "GHSA-cv8v-qqh2-qx57", "modified": "2022-05-24T17:24:00Z", "published": "2022-05-24T17:24:00Z", "aliases": [ "CVE-2020-6102" ], "details": "An exploitable code execution vulnerability exists in the Shader functionality of AMD Radeon DirectX 11 Driver atidxx64.dll 26.20.15019.19000. An attacker can provide a a specially crafted shader file to trigger this vulnerability, resulting in code execution. This vulnerability can be triggered from a HYPER-V guest using the RemoteFX feature, leading to executing the vulnerable code on the HYPER-V host (inside of the rdvgm.exe process). Theoretically this vulnerability could be also triggered from web browser (using webGL and webassembly).", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-6102" }, { "type": "WEB", "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1042\"" }, { "type": "WEB", "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1042" } ], "database_specific": { "cwe_ids": [ "CWE-20", "CWE-787" ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2020-07-20T21:15:00Z" } }