Read Time:30 Second
Description
The product allows address regions to overlap, which can result in the bypassing of intended memory protection.
Modes of Introduction:
– Architecture and Design
Related Weaknesses
Consequences
Confidentiality, Integrity, Availability: Modify Memory, Read Memory, DoS: Instability
Potential Mitigations
Phase: Architecture and Design
Description:
Phase: Implementation
Effectiveness: High
Description:
CVE References
- CVE-2008-7096
- virtualization product allows compromise of hardware product by accessing certain remapping registers.
- [REF-1100]
- processor design flaw allows ring 0 code to access more privileged rings by causing a register window to overlap a range of protected system RAM [REF-1100]