"The virus in question takes advantage of a vulnerability in Windows x86-64, and not anything specific in our processor," said Richard Baker, European channel marketing manager at AMD.
Peter Ferrie, senior security response engineer at Symantec, author of the original alert, has now updated his blog.
"I have posted this blog ... to outline a recent Q&A session that provides more information about my previous blog regarding a new virus affecting the AMD64 platform," he wrote.
Discovered by Symantec in an online forum for virus writers, the two items of malware, dubbed w32.bounds and w64.bounds, infect systems by tying themselves to Windows executable files.
They have the ability to execute chip-level assembly code, but are not classified as so-called chip-level threats.
They affect all Windows x86-64 architectures, which includes Intel and AMD chips, but not Intel's Itanium IA64.
"The virus exploits no flaws in the CPUs," wrote Ferrie in his updated blog.
"It is using a designed-in feature of the operating system in a slightly unusual way; however, it completely conforms to the specification.
"In addition, it should be noted that w64.bounds is specific only to the AMD64 style of CPU (which includes the Intel EM64T), as opposed to Intel's Itanium, on which it won't run."
Although potentially dangerous, the malware has not been used to create a widely distributed virus, nor could it, according to Symantec. The virus writers are simply demonstrating their technical prowess.
And, yep, it'll run Android rather than RiscOS
US engineering giant's cost-cutting outsourcing plan is on the rocks, according to insiders
HP Envy X2 laptop only affordable if you've got loadsamoney
Counterfeit code-signing certificates enabling hackers to hide malware being sold by cyber criminals
Certificates can be used as part of layered obfuscation to evade detection by anti-virus software