CERTFR-2019-AVI-108

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans les produits Intel. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et un déni de service.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Intel N/A Processeur Intel Celeron J4105
Intel N/A Intel CSME versions 11.0 à 11.8.55
Intel N/A Intel CSME versions 11.20 à 11.22.0
Intel N/A Intel Data Center Manager SDK versions antérieures à 5.0.2
Intel N/A Intel CSME versions 12.0 à 12.0.10
Intel N/A Processeur Intel Celeron N4000
Intel N/A Intel Accelerated Storage Manager RSTe versions 5.5 et antérieures
Intel N/A Intel Server Board
Intel N/A Intel Server System
Intel N/A Processeur Intel Core de 7ème génération
Intel N/A Intel Compute ModuleIntel Graphics Driver pour Windows versions antérieures à 10.18.x.5059 (aussi connu comme 15.33.x.5059), 10.18.x.5057 (aussi connu comme 15.36.x.5057), 20.19.x.5063 (aussi connu comme 15.40.x.5063) 21.20.x.5064 (aussi connu comme 15.45.x.5064) et 24.20.100.6373
Intel N/A Intel CSME versions 11.10 à 11.11.55
Intel N/A Intel Trusted Execution Engine versions 4.0 à 4.0.5
Intel N/A Processeur Intel Core de 8ème génération
Intel N/A Processeur Intel Pentium Silver N5000
Intel N/A Composant Intel Unite Solution software server version 3.2 à 3.3
Intel N/A Processeur Intel Celeron N4100
Intel N/A Intel Server Platform Services versions SPS 4.01.00.152.0 à SPS 4.01.02.173
Intel N/A Intel Server Platform Services versions SPS 4.00.04.367 à SPS 4.00.04.382
Intel N/A Processeur Intel Pentium Silver J5005
Intel N/A Processeur Intel Celeron J4005
Intel N/A Intel Trusted Execution Engine versions 3.0 à 3.1.50

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Processeur Intel Celeron J4105",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel CSME versions 11.0 \u00e0 11.8.55",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel CSME versions 11.20 \u00e0 11.22.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Data Center Manager SDK versions ant\u00e9rieures \u00e0 5.0.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel CSME versions 12.0 \u00e0 12.0.10",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeur Intel Celeron N4000",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Accelerated Storage Manager RSTe versions 5.5 et ant\u00e9rieures",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Server Board",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Server System",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeur Intel Core de 7\u00e8me g\u00e9n\u00e9ration",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Compute ModuleIntel Graphics Driver pour Windows versions ant\u00e9rieures \u00e0 10.18.x.5059 (aussi connu comme 15.33.x.5059), 10.18.x.5057 (aussi connu comme 15.36.x.5057), 20.19.x.5063 (aussi connu comme 15.40.x.5063) 21.20.x.5064 (aussi connu comme 15.45.x.5064) et 24.20.100.6373",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel CSME versions 11.10 \u00e0 11.11.55",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Trusted Execution Engine versions 4.0 \u00e0 4.0.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeur Intel Core de 8\u00e8me g\u00e9n\u00e9ration",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeur Intel Pentium Silver N5000",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Composant Intel Unite Solution software server version 3.2 \u00e0 3.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeur Intel Celeron N4100",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Server Platform Services versions SPS 4.01.00.152.0 \u00e0 SPS 4.01.02.173",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Server Platform Services versions SPS 4.00.04.367 \u00e0 SPS 4.00.04.382",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeur Intel Pentium Silver J5005",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Processeur Intel Celeron J4005",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Trusted Execution Engine versions 3.0 \u00e0 3.1.50",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2018-12223",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-12223"
    },
    {
      "name": "CVE-2019-0108",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0108"
    },
    {
      "name": "CVE-2018-12215",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-12215"
    },
    {
      "name": "CVE-2018-12188",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-12188"
    },
    {
      "name": "CVE-2018-12205",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-12205"
    },
    {
      "name": "CVE-2019-0103",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0103"
    },
    {
      "name": "CVE-2018-12222",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-12222"
    },
    {
      "name": "CVE-2018-12212",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-12212"
    },
    {
      "name": "CVE-2018-12213",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-12213"
    },
    {
      "name": "CVE-2018-12202",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-12202"
    },
    {
      "name": "CVE-2018-12199",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-12199"
    },
    {
      "name": "CVE-2018-12221",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-12221"
    },
    {
      "name": "CVE-2019-0107",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0107"
    },
    {
      "name": "CVE-2018-12191",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-12191"
    },
    {
      "name": "CVE-2018-12200",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-12200"
    },
    {
      "name": "CVE-2018-12204",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-12204"
    },
    {
      "name": "CVE-2018-12214",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-12214"
    },
    {
      "name": "CVE-2019-0105",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0105"
    },
    {
      "name": "CVE-2018-18089",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-18089"
    },
    {
      "name": "CVE-2019-0109",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0109"
    },
    {
      "name": "CVE-2018-12187",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-12187"
    },
    {
      "name": "CVE-2018-12219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-12219"
    },
    {
      "name": "CVE-2019-0102",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0102"
    },
    {
      "name": "CVE-2018-12192",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-12192"
    },
    {
      "name": "CVE-2018-12208",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-12208"
    },
    {
      "name": "CVE-2019-0101",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0101"
    },
    {
      "name": "CVE-2018-12217",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-12217"
    },
    {
      "name": "CVE-2018-12189",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-12189"
    },
    {
      "name": "CVE-2018-12196",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-12196"
    },
    {
      "name": "CVE-2019-0135",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0135"
    },
    {
      "name": "CVE-2018-12201",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-12201"
    },
    {
      "name": "CVE-2018-12211",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-12211"
    },
    {
      "name": "CVE-2019-0106",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0106"
    },
    {
      "name": "CVE-2018-12203",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-12203"
    },
    {
      "name": "CVE-2018-12209",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-12209"
    },
    {
      "name": "CVE-2019-0112",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0112"
    },
    {
      "name": "CVE-2019-0110",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0110"
    },
    {
      "name": "CVE-2018-12185",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-12185"
    },
    {
      "name": "CVE-2019-0111",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0111"
    },
    {
      "name": "CVE-2018-12218",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-12218"
    },
    {
      "name": "CVE-2018-12220",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-12220"
    },
    {
      "name": "CVE-2018-12216",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-12216"
    },
    {
      "name": "CVE-2018-12224",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-12224"
    },
    {
      "name": "CVE-2019-0104",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-0104"
    },
    {
      "name": "CVE-2018-12210",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-12210"
    },
    {
      "name": "CVE-2018-12198",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-12198"
    },
    {
      "name": "CVE-2018-18090",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-18090"
    },
    {
      "name": "CVE-2018-12190",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-12190"
    },
    {
      "name": "CVE-2018-18091",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-18091"
    }
  ],
  "links": [],
  "reference": "CERTFR-2019-AVI-108",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2019-03-13T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire"
    },
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service \u00e0 distance et un d\u00e9ni\nde service.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00189 du 12 mars 2019",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00189.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00231 du 12 mars 2019",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00231.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00215 du 12 mars 2019",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00215.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00185 du 12 mars 2019",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00185.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00214 du 12 mars 2019",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00214.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00191 du 12 mars 2019",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00191.html"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…