Vulnerabilites related to intel - ethernet_controller_xl710-bm2_sllk7
cve-2016-8106
Vulnerability from cvelistv5
Published
2017-01-09 21:00
Modified
2024-08-06 02:13
Severity ?
Summary
A Denial of Service in Intel Ethernet Controller's X710/XL710 with Non-Volatile Memory Images before version 5.05 allows a remote attacker to stop the controller from processing network traffic working under certain network use conditions.
Impacted products
Vendor Product Version
Intel Intel® Ethernet Controller X710 family and Intel® Ethernet Controller XL710 family Version: Before NVM Version 5.05
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T02:13:21.874Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "95333",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/95333",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00063&languageid=en-fr",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www-01.ibm.com/support/docview.wss?uid=swg22002507",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://support.lenovo.com/us/en/product_security/LEN-12029",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05368378",
               },
               {
                  name: "1037562",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id/1037562",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20190731-0001/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Intel® Ethernet Controller X710 family and Intel® Ethernet Controller XL710 family",
               vendor: "Intel",
               versions: [
                  {
                     status: "affected",
                     version: "Before NVM Version 5.05",
                  },
               ],
            },
         ],
         datePublic: "2017-01-09T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "A Denial of Service in Intel Ethernet Controller's X710/XL710 with Non-Volatile Memory Images before version 5.05 allows a remote attacker to stop the controller from processing network traffic working under certain network use conditions.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Denial of Service",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-08-01T00:06:08",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               name: "95333",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/95333",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00063&languageid=en-fr",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www-01.ibm.com/support/docview.wss?uid=swg22002507",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://support.lenovo.com/us/en/product_security/LEN-12029",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05368378",
            },
            {
               name: "1037562",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id/1037562",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20190731-0001/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               ID: "CVE-2016-8106",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Intel® Ethernet Controller X710 family and Intel® Ethernet Controller XL710 family",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Before NVM Version 5.05",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Intel",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A Denial of Service in Intel Ethernet Controller's X710/XL710 with Non-Volatile Memory Images before version 5.05 allows a remote attacker to stop the controller from processing network traffic working under certain network use conditions.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Denial of Service",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "95333",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/95333",
                  },
                  {
                     name: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00063&languageid=en-fr",
                     refsource: "CONFIRM",
                     url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00063&languageid=en-fr",
                  },
                  {
                     name: "http://www-01.ibm.com/support/docview.wss?uid=swg22002507",
                     refsource: "CONFIRM",
                     url: "http://www-01.ibm.com/support/docview.wss?uid=swg22002507",
                  },
                  {
                     name: "https://support.lenovo.com/us/en/product_security/LEN-12029",
                     refsource: "CONFIRM",
                     url: "https://support.lenovo.com/us/en/product_security/LEN-12029",
                  },
                  {
                     name: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05368378",
                     refsource: "CONFIRM",
                     url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05368378",
                  },
                  {
                     name: "1037562",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id/1037562",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20190731-0001/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20190731-0001/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2016-8106",
      datePublished: "2017-01-09T21:00:00",
      dateReserved: "2016-09-09T00:00:00",
      dateUpdated: "2024-08-06T02:13:21.874Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

Vulnerability from fkie_nvd
Published
2017-01-09 21:59
Modified
2024-11-21 02:58
Summary
A Denial of Service in Intel Ethernet Controller's X710/XL710 with Non-Volatile Memory Images before version 5.05 allows a remote attacker to stop the controller from processing network traffic working under certain network use conditions.
Impacted products
Vendor Product Version
intel ethernet_controller_x710_firmware *
intel ethernet_controller_x710-am2_sr1zp -
intel ethernet_controller_x710-am2_sr1zq -
intel ethernet_controller_x710-bm2_sllkb -
intel ethernet_controller_x710-bm2_sllkc -
intel ethernet_controller_xl710-am1_sr1zm -
intel ethernet_controller_xl710-am1_sr1zn -
intel ethernet_controller_xl710-am2_sr1zk -
intel ethernet_controller_xl710-am2_sr1zl -
intel ethernet_controller_xl710-bm1_sllk9 -
intel ethernet_controller_xl710-bm1_sllka -
intel ethernet_controller_xl710-bm2_sllk7 -
intel ethernet_controller_xl710-bm2_sllk8 -
intel ethernet_controller_xl710_firmware *
intel eth_converged_ntwk_adptr_x710-da2_ex710da2g1p5 -
intel eth_converged_ntwk_adptr_x710-da4_ex710da4fhg1p5 -
intel eth_converged_ntwk_adptr_x710-da4_ex710da4g1p5 -
intel eth_converged_ntwk_adptr_xl710-qda1_exl710qda1g1p5 -
intel eth_converged_ntwk_adptr_xl710-qda2_exl710qda2g1p5 -
intel ethernet_converged_network_adapter_x710-da2_x710da2 -
intel ethernet_converged_network_adapter_x710-da2_x710da2blk -
intel ethernet_converged_network_adapter_x710-da2_x710da2g2p5 -
intel ethernet_converged_network_adapter_x710-da4_x710da4fh -
intel ethernet_converged_network_adapter_x710-da4_x710da4fhblk -
intel ethernet_converged_network_adapter_x710-da4_x710da4fhg2p5 -
intel ethernet_converged_network_adapter_x710-da4_x710da4g2p5 -
intel ethernet_converged_network_adapter_xl710-qda1_xl710qda1 -
intel ethernet_converged_network_adapter_xl710-qda1_xl710qda1blk -
intel ethernet_converged_network_adapter_xl710-qda1_xl710qda1g2p5 -
intel ethernet_converged_network_adapter_xl710-qda2_xl710qda2 -
intel ethernet_converged_network_adapter_xl710-qda2_xl710qda2blk -
intel ethernet_converged_network_adapter_xl710-qda2_xl710qda2g2p5 -
intel ethernet_i\/o_module_xl710-qda1_axx1p40frtiom -
intel ethernet_i\/o_module_xl710-qda2_axx2p40frtiom -
hp ethernet_10gb_2-port_562flr-sfp\+ *
hp ethernet_10gb_2-port_562sfp\+ *
hp ethernet_10gb_4-port_563sfp\+ *
hp proliant_xl260a_g9_server *
lenovo converged_hx_series 5.05
lenovo converged_hx5500_appliance 5.05
lenovo converged_hx5510_appliance 5.05
lenovo converged_hx7500_appliance 5.05
lenovo converged_hx7510_appliance 5.05
lenovo nextscale_nx360_m5 5.05
lenovo system_x3250_m5 5.05
lenovo system_x3500_m5 5.05
lenovo system_x3550_m5 5.05
lenovo system_x3650_m5 5.05
lenovo system_x3750_m4 5.05
lenovo system_x3850_x6 5.05
lenovo system_x3950_x6 5.05
lenovo thinkagile_cx2200 5.05
lenovo thinkagile_cx4200 5.05
lenovo thinkagile_cx4600 5.05
lenovo thinkserver_rd350 5.05
lenovo thinkserver_rd450 5.05
lenovo thinkserver_rd550 5.05
lenovo thinkserver_rd650 5.05
lenovo thinkserver_sd350 5.05
lenovo thinkserver_td350 5.05



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:ethernet_controller_x710_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F32F15AD-C473-4CA9-83C0-5C5A742F79D0",
                     versionEndIncluding: "5.04",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:ethernet_controller_x710-am2_sr1zp:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC2A83AF-9369-4402-8A75-A3C475CBB3F6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:ethernet_controller_x710-am2_sr1zq:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "97B1C742-A502-4141-B5BF-E0CB369152C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:ethernet_controller_x710-bm2_sllkb:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "69B0751F-4A90-4904-ADE0-DEE514BF6250",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:ethernet_controller_x710-bm2_sllkc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "51D6F374-62A0-42FC-B8D4-9C81FE88B9F9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:ethernet_controller_xl710-am1_sr1zm:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "82C95EFE-2415-4BC3-870C-8FB417DAB28A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:ethernet_controller_xl710-am1_sr1zn:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "77AF59A1-845E-4CCF-8981-97781E424BD3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:ethernet_controller_xl710-am2_sr1zk:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9B8A610-92A4-4126-A28D-9D2C2A14EA71",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:ethernet_controller_xl710-am2_sr1zl:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9922F300-F6B6-4577-B8BD-EEDC4B8BCE32",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:ethernet_controller_xl710-bm1_sllk9:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B150A489-45CC-4E9E-8EAB-17428027B3BF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:ethernet_controller_xl710-bm1_sllka:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D38675ED-3E60-4595-89A8-8CA1AB27BC46",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:ethernet_controller_xl710-bm2_sllk7:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F15CBDA2-2C43-4217-B13A-22D3538F2661",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:ethernet_controller_xl710-bm2_sllk8:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0AD4DFC6-B159-4A8B-8F9A-CE7BA50D9671",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:ethernet_controller_xl710_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A146247-ECE2-48A3-A35F-01559274D237",
                     versionEndIncluding: "5.04",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:eth_converged_ntwk_adptr_x710-da2_ex710da2g1p5:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F0411F19-A223-4B66-B931-E1BB18FBCB62",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:eth_converged_ntwk_adptr_x710-da4_ex710da4fhg1p5:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9357AC7-6247-4228-BBAE-67020C74D38F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:eth_converged_ntwk_adptr_x710-da4_ex710da4g1p5:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "626CD805-9C8D-434F-AA31-EB83D009076E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:eth_converged_ntwk_adptr_xl710-qda1_exl710qda1g1p5:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AAFA5E8B-C6F2-4EAA-A50B-92D858F82ED3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:eth_converged_ntwk_adptr_xl710-qda2_exl710qda2g1p5:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8ABA5AB6-9A30-4852-87E3-F1594BE83750",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:ethernet_converged_network_adapter_x710-da2_x710da2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "91BC4250-0C6D-4458-B9B5-AA4008C08EB3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:ethernet_converged_network_adapter_x710-da2_x710da2blk:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F11DB4C8-566C-448C-A18D-C625FA9DE11E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:ethernet_converged_network_adapter_x710-da2_x710da2g2p5:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D3B8147B-767F-49EF-9046-45BCFA2B2661",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:ethernet_converged_network_adapter_x710-da4_x710da4fh:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C6709DAF-EE92-4110-8692-4A53C596CBE8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:ethernet_converged_network_adapter_x710-da4_x710da4fhblk:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A916CAF0-EDCF-40D5-968F-652E378FF97C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:ethernet_converged_network_adapter_x710-da4_x710da4fhg2p5:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD026C34-293A-4DCD-874E-63BFE7116BDB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:ethernet_converged_network_adapter_x710-da4_x710da4g2p5:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "87965D8A-A5FD-4BD9-86F9-9E48E6108A06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:ethernet_converged_network_adapter_xl710-qda1_xl710qda1:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C438018-EC3A-4226-8252-1A77E5A50250",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:ethernet_converged_network_adapter_xl710-qda1_xl710qda1blk:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7254F006-9AD7-4837-ABB9-7A5A8327AD49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:ethernet_converged_network_adapter_xl710-qda1_xl710qda1g2p5:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9919B1A6-B5B9-4B54-89B6-FA3C17B13F48",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:ethernet_converged_network_adapter_xl710-qda2_xl710qda2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CC2E93B-DF2D-4442-9CA5-52F2BE36F411",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:ethernet_converged_network_adapter_xl710-qda2_xl710qda2blk:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "84F67FE6-38C0-446C-8AD5-C9F713E188C1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:ethernet_converged_network_adapter_xl710-qda2_xl710qda2g2p5:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "30E51776-294A-449E-8EA9-49BD2725FBB1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:ethernet_i\\/o_module_xl710-qda1_axx1p40frtiom:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2E6BE9F-2333-4D14-94A0-90565430DCC1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:ethernet_i\\/o_module_xl710-qda2_axx2p40frtiom:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE2B9FB5-9868-42C7-96C8-464820F17D60",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:hp:ethernet_10gb_2-port_562flr-sfp\\+:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA295D13-518D-4E43-B112-77D2A48F01AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:hp:ethernet_10gb_2-port_562sfp\\+:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "280334EE-CDCF-4EBC-97D6-7FA1507BDF3C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:hp:ethernet_10gb_4-port_563sfp\\+:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "31F9FCDB-CBD5-448C-B459-A90379A067E9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:hp:proliant_xl260a_g9_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0C39A32-1068-4C64-9609-E9E789221B2B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:lenovo:converged_hx_series:5.05:*:*:*:*:*:*:*",
                     matchCriteriaId: "B462A39A-B3CF-4D3D-B138-87EDCFCC2A36",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lenovo:converged_hx5500_appliance:5.05:*:*:*:*:*:*:*",
                     matchCriteriaId: "5FE78714-3153-47EC-BA64-AB8EB2CE894C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lenovo:converged_hx5510_appliance:5.05:*:*:*:*:*:*:*",
                     matchCriteriaId: "638A62EA-C574-4359-84B1-046F49B5387E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lenovo:converged_hx7500_appliance:5.05:*:*:*:*:*:*:*",
                     matchCriteriaId: "A1670FD8-05F2-4F29-AA5F-ED97291BAFA6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lenovo:converged_hx7510_appliance:5.05:*:*:*:*:*:*:*",
                     matchCriteriaId: "C3B66CB9-3FD9-47D5-9817-62371C1ECC22",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lenovo:nextscale_nx360_m5:5.05:*:*:*:*:*:*:*",
                     matchCriteriaId: "6D4ECA79-BC4B-4888-A4DE-52492833B530",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lenovo:system_x3250_m5:5.05:*:*:*:*:*:*:*",
                     matchCriteriaId: "758D0933-1265-4593-8647-E20E0CC24A93",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lenovo:system_x3500_m5:5.05:*:*:*:*:*:*:*",
                     matchCriteriaId: "686DB4DF-32A4-4FD4-A93E-E0E2171D4B9E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lenovo:system_x3550_m5:5.05:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F5D1172-A454-4550-9475-13834BE92A19",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lenovo:system_x3650_m5:5.05:*:*:*:*:*:*:*",
                     matchCriteriaId: "C040CE58-3A77-4689-BD61-8D82B6AE8128",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lenovo:system_x3750_m4:5.05:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4098AC2-11F5-49C1-A4CB-570B1F3EBC82",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lenovo:system_x3850_x6:5.05:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A619F9E-AE80-4DC9-8DAD-B2123D005060",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lenovo:system_x3950_x6:5.05:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F29E2DF-A1AD-4BA3-917A-1E86C9BAD49C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lenovo:thinkagile_cx2200:5.05:*:*:*:*:*:*:*",
                     matchCriteriaId: "1825E3B4-D5B6-48E9-8395-047EB41E3A34",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lenovo:thinkagile_cx4200:5.05:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D8937BA-4BD8-40C7-B23D-A404252562A7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lenovo:thinkagile_cx4600:5.05:*:*:*:*:*:*:*",
                     matchCriteriaId: "FBAC6BBC-B21E-437B-81D8-63021C69E55A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lenovo:thinkserver_rd350:5.05:*:*:*:*:*:*:*",
                     matchCriteriaId: "23DDFE96-ED30-4818-AA30-CC009ACC4CCC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lenovo:thinkserver_rd450:5.05:*:*:*:*:*:*:*",
                     matchCriteriaId: "40318330-EB26-4242-8378-A69F01C479F7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lenovo:thinkserver_rd550:5.05:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD58C401-31C3-48C9-B1AC-94706A98D286",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lenovo:thinkserver_rd650:5.05:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C273581-6BAD-46F2-B865-0520B8F3ED65",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lenovo:thinkserver_sd350:5.05:*:*:*:*:*:*:*",
                     matchCriteriaId: "FF56B9E8-D24C-420F-8661-ADB3052F92CE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:lenovo:thinkserver_td350:5.05:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C9B0ED3-3686-442F-A1D2-96F61FFA117B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A Denial of Service in Intel Ethernet Controller's X710/XL710 with Non-Volatile Memory Images before version 5.05 allows a remote attacker to stop the controller from processing network traffic working under certain network use conditions.",
      },
      {
         lang: "es",
         value: "Una denegación de servicio en Intel Ethernet Controller's X710/XL710 con Non-Volatile Memory Images en versiones anteriores a 5.05 permite a atacantes remotos detener el controlador de procesar el tráfico de red que funciona bajo determinadas condiciones de uso de la red.",
      },
   ],
   id: "CVE-2016-8106",
   lastModified: "2024-11-21T02:58:57.530",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.3,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 5.9,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 2.2,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2017-01-09T21:59:00.160",
   references: [
      {
         source: "secure@intel.com",
         url: "http://www-01.ibm.com/support/docview.wss?uid=swg22002507",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/95333",
      },
      {
         source: "secure@intel.com",
         url: "http://www.securitytracker.com/id/1037562",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05368378",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00063&languageid=en-fr",
      },
      {
         source: "secure@intel.com",
         url: "https://security.netapp.com/advisory/ntap-20190731-0001/",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://support.lenovo.com/us/en/product_security/LEN-12029",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www-01.ibm.com/support/docview.wss?uid=swg22002507",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/95333",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securitytracker.com/id/1037562",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05368378",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00063&languageid=en-fr",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://security.netapp.com/advisory/ntap-20190731-0001/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://support.lenovo.com/us/en/product_security/LEN-12029",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}