cve-2016-8106
Vulnerability from cvelistv5
Published
2017-01-09 21:00
Modified
2024-08-06 02:13
Severity ?
Summary
A Denial of Service in Intel Ethernet Controller's X710/XL710 with Non-Volatile Memory Images before version 5.05 allows a remote attacker to stop the controller from processing network traffic working under certain network use conditions.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T02:13:21.874Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "95333",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/95333"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00063\u0026languageid=en-fr"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www-01.ibm.com/support/docview.wss?uid=swg22002507"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.lenovo.com/us/en/product_security/LEN-12029"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05368378"
          },
          {
            "name": "1037562",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1037562"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20190731-0001/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel\u00c2\u00ae Ethernet Controller X710 family and Intel\u00c2\u00ae Ethernet Controller XL710 family",
          "vendor": "Intel",
          "versions": [
            {
              "status": "affected",
              "version": "Before NVM Version 5.05"
            }
          ]
        }
      ],
      "datePublic": "2017-01-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A Denial of Service in Intel Ethernet Controller\u0027s X710/XL710 with Non-Volatile Memory Images before version 5.05 allows a remote attacker to stop the controller from processing network traffic working under certain network use conditions."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-08-01T00:06:08",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "name": "95333",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/95333"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00063\u0026languageid=en-fr"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www-01.ibm.com/support/docview.wss?uid=swg22002507"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.lenovo.com/us/en/product_security/LEN-12029"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05368378"
        },
        {
          "name": "1037562",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1037562"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20190731-0001/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2016-8106",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel\u00c2\u00ae Ethernet Controller X710 family and Intel\u00c2\u00ae Ethernet Controller XL710 family",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Before NVM Version 5.05"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Intel"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A Denial of Service in Intel Ethernet Controller\u0027s X710/XL710 with Non-Volatile Memory Images before version 5.05 allows a remote attacker to stop the controller from processing network traffic working under certain network use conditions."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Denial of Service"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "95333",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/95333"
            },
            {
              "name": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00063\u0026languageid=en-fr",
              "refsource": "CONFIRM",
              "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00063\u0026languageid=en-fr"
            },
            {
              "name": "http://www-01.ibm.com/support/docview.wss?uid=swg22002507",
              "refsource": "CONFIRM",
              "url": "http://www-01.ibm.com/support/docview.wss?uid=swg22002507"
            },
            {
              "name": "https://support.lenovo.com/us/en/product_security/LEN-12029",
              "refsource": "CONFIRM",
              "url": "https://support.lenovo.com/us/en/product_security/LEN-12029"
            },
            {
              "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05368378",
              "refsource": "CONFIRM",
              "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05368378"
            },
            {
              "name": "1037562",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1037562"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20190731-0001/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20190731-0001/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2016-8106",
    "datePublished": "2017-01-09T21:00:00",
    "dateReserved": "2016-09-09T00:00:00",
    "dateUpdated": "2024-08-06T02:13:21.874Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:intel:ethernet_controller_x710_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"5.04\", \"matchCriteriaId\": \"F32F15AD-C473-4CA9-83C0-5C5A742F79D0\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:ethernet_controller_x710-am2_sr1zp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FC2A83AF-9369-4402-8A75-A3C475CBB3F6\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:ethernet_controller_x710-am2_sr1zq:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"97B1C742-A502-4141-B5BF-E0CB369152C3\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:ethernet_controller_x710-bm2_sllkb:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"69B0751F-4A90-4904-ADE0-DEE514BF6250\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:ethernet_controller_x710-bm2_sllkc:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"51D6F374-62A0-42FC-B8D4-9C81FE88B9F9\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:ethernet_controller_xl710-am1_sr1zm:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"82C95EFE-2415-4BC3-870C-8FB417DAB28A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:ethernet_controller_xl710-am1_sr1zn:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"77AF59A1-845E-4CCF-8981-97781E424BD3\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:ethernet_controller_xl710-am2_sr1zk:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E9B8A610-92A4-4126-A28D-9D2C2A14EA71\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:ethernet_controller_xl710-am2_sr1zl:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9922F300-F6B6-4577-B8BD-EEDC4B8BCE32\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:ethernet_controller_xl710-bm1_sllk9:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B150A489-45CC-4E9E-8EAB-17428027B3BF\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:ethernet_controller_xl710-bm1_sllka:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D38675ED-3E60-4595-89A8-8CA1AB27BC46\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:ethernet_controller_xl710-bm2_sllk7:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F15CBDA2-2C43-4217-B13A-22D3538F2661\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:ethernet_controller_xl710-bm2_sllk8:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0AD4DFC6-B159-4A8B-8F9A-CE7BA50D9671\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:intel:ethernet_controller_xl710_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"5.04\", \"matchCriteriaId\": \"8A146247-ECE2-48A3-A35F-01559274D237\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:eth_converged_ntwk_adptr_x710-da2_ex710da2g1p5:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F0411F19-A223-4B66-B931-E1BB18FBCB62\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:eth_converged_ntwk_adptr_x710-da4_ex710da4fhg1p5:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E9357AC7-6247-4228-BBAE-67020C74D38F\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:eth_converged_ntwk_adptr_x710-da4_ex710da4g1p5:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"626CD805-9C8D-434F-AA31-EB83D009076E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:eth_converged_ntwk_adptr_xl710-qda1_exl710qda1g1p5:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AAFA5E8B-C6F2-4EAA-A50B-92D858F82ED3\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:eth_converged_ntwk_adptr_xl710-qda2_exl710qda2g1p5:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8ABA5AB6-9A30-4852-87E3-F1594BE83750\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:ethernet_converged_network_adapter_x710-da2_x710da2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"91BC4250-0C6D-4458-B9B5-AA4008C08EB3\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:ethernet_converged_network_adapter_x710-da2_x710da2blk:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F11DB4C8-566C-448C-A18D-C625FA9DE11E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:ethernet_converged_network_adapter_x710-da2_x710da2g2p5:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D3B8147B-767F-49EF-9046-45BCFA2B2661\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:ethernet_converged_network_adapter_x710-da4_x710da4fh:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C6709DAF-EE92-4110-8692-4A53C596CBE8\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:ethernet_converged_network_adapter_x710-da4_x710da4fhblk:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A916CAF0-EDCF-40D5-968F-652E378FF97C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:ethernet_converged_network_adapter_x710-da4_x710da4fhg2p5:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CD026C34-293A-4DCD-874E-63BFE7116BDB\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:ethernet_converged_network_adapter_x710-da4_x710da4g2p5:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"87965D8A-A5FD-4BD9-86F9-9E48E6108A06\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:ethernet_converged_network_adapter_xl710-qda1_xl710qda1:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6C438018-EC3A-4226-8252-1A77E5A50250\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:ethernet_converged_network_adapter_xl710-qda1_xl710qda1blk:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7254F006-9AD7-4837-ABB9-7A5A8327AD49\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:ethernet_converged_network_adapter_xl710-qda1_xl710qda1g2p5:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9919B1A6-B5B9-4B54-89B6-FA3C17B13F48\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:ethernet_converged_network_adapter_xl710-qda2_xl710qda2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3CC2E93B-DF2D-4442-9CA5-52F2BE36F411\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:ethernet_converged_network_adapter_xl710-qda2_xl710qda2blk:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"84F67FE6-38C0-446C-8AD5-C9F713E188C1\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:ethernet_converged_network_adapter_xl710-qda2_xl710qda2g2p5:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"30E51776-294A-449E-8EA9-49BD2725FBB1\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:ethernet_i\\\\/o_module_xl710-qda1_axx1p40frtiom:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D2E6BE9F-2333-4D14-94A0-90565430DCC1\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:ethernet_i\\\\/o_module_xl710-qda2_axx2p40frtiom:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FE2B9FB5-9868-42C7-96C8-464820F17D60\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hp:ethernet_10gb_2-port_562flr-sfp\\\\+:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DA295D13-518D-4E43-B112-77D2A48F01AA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hp:ethernet_10gb_2-port_562sfp\\\\+:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"280334EE-CDCF-4EBC-97D6-7FA1507BDF3C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hp:ethernet_10gb_4-port_563sfp\\\\+:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"31F9FCDB-CBD5-448C-B459-A90379A067E9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hp:proliant_xl260a_g9_server:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A0C39A32-1068-4C64-9609-E9E789221B2B\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:lenovo:converged_hx_series:5.05:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B462A39A-B3CF-4D3D-B138-87EDCFCC2A36\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:lenovo:converged_hx5500_appliance:5.05:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5FE78714-3153-47EC-BA64-AB8EB2CE894C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:lenovo:converged_hx5510_appliance:5.05:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"638A62EA-C574-4359-84B1-046F49B5387E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:lenovo:converged_hx7500_appliance:5.05:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A1670FD8-05F2-4F29-AA5F-ED97291BAFA6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:lenovo:converged_hx7510_appliance:5.05:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C3B66CB9-3FD9-47D5-9817-62371C1ECC22\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:lenovo:nextscale_nx360_m5:5.05:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6D4ECA79-BC4B-4888-A4DE-52492833B530\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:lenovo:system_x3250_m5:5.05:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"758D0933-1265-4593-8647-E20E0CC24A93\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:lenovo:system_x3500_m5:5.05:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"686DB4DF-32A4-4FD4-A93E-E0E2171D4B9E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:lenovo:system_x3550_m5:5.05:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5F5D1172-A454-4550-9475-13834BE92A19\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:lenovo:system_x3650_m5:5.05:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C040CE58-3A77-4689-BD61-8D82B6AE8128\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:lenovo:system_x3750_m4:5.05:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D4098AC2-11F5-49C1-A4CB-570B1F3EBC82\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:lenovo:system_x3850_x6:5.05:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3A619F9E-AE80-4DC9-8DAD-B2123D005060\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:lenovo:system_x3950_x6:5.05:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2F29E2DF-A1AD-4BA3-917A-1E86C9BAD49C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:lenovo:thinkagile_cx2200:5.05:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1825E3B4-D5B6-48E9-8395-047EB41E3A34\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:lenovo:thinkagile_cx4200:5.05:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1D8937BA-4BD8-40C7-B23D-A404252562A7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:lenovo:thinkagile_cx4600:5.05:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FBAC6BBC-B21E-437B-81D8-63021C69E55A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:lenovo:thinkserver_rd350:5.05:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"23DDFE96-ED30-4818-AA30-CC009ACC4CCC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:lenovo:thinkserver_rd450:5.05:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"40318330-EB26-4242-8378-A69F01C479F7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:lenovo:thinkserver_rd550:5.05:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DD58C401-31C3-48C9-B1AC-94706A98D286\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:lenovo:thinkserver_rd650:5.05:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C273581-6BAD-46F2-B865-0520B8F3ED65\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:lenovo:thinkserver_sd350:5.05:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF56B9E8-D24C-420F-8661-ADB3052F92CE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:lenovo:thinkserver_td350:5.05:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C9B0ED3-3686-442F-A1D2-96F61FFA117B\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"A Denial of Service in Intel Ethernet Controller\u0027s X710/XL710 with Non-Volatile Memory Images before version 5.05 allows a remote attacker to stop the controller from processing network traffic working under certain network use conditions.\"}, {\"lang\": \"es\", \"value\": \"Una denegaci\\u00f3n de servicio en Intel Ethernet Controller\u0027s X710/XL710 con Non-Volatile Memory Images en versiones anteriores a 5.05 permite a atacantes remotos detener el controlador de procesar el tr\\u00e1fico de red que funciona bajo determinadas condiciones de uso de la red.\"}]",
      "id": "CVE-2016-8106",
      "lastModified": "2024-11-21T02:58:57.530",
      "metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 5.9, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.2, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:N/I:N/A:P\", \"baseScore\": 4.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2017-01-09T21:59:00.160",
      "references": "[{\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg22002507\", \"source\": \"secure@intel.com\"}, {\"url\": \"http://www.securityfocus.com/bid/95333\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id/1037562\", \"source\": \"secure@intel.com\"}, {\"url\": \"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05368378\", \"source\": \"secure@intel.com\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00063\u0026languageid=en-fr\", \"source\": \"secure@intel.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20190731-0001/\", \"source\": \"secure@intel.com\"}, {\"url\": \"https://support.lenovo.com/us/en/product_security/LEN-12029\", \"source\": \"secure@intel.com\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg22002507\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/95333\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id/1037562\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05368378\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00063\u0026languageid=en-fr\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20190731-0001/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://support.lenovo.com/us/en/product_security/LEN-12029\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}]",
      "sourceIdentifier": "secure@intel.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2016-8106\",\"sourceIdentifier\":\"secure@intel.com\",\"published\":\"2017-01-09T21:59:00.160\",\"lastModified\":\"2024-11-21T02:58:57.530\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A Denial of Service in Intel Ethernet Controller\u0027s X710/XL710 with Non-Volatile Memory Images before version 5.05 allows a remote attacker to stop the controller from processing network traffic working under certain network use conditions.\"},{\"lang\":\"es\",\"value\":\"Una denegaci\u00f3n de servicio en Intel Ethernet Controller\u0027s X710/XL710 con Non-Volatile Memory Images en versiones anteriores a 5.05 permite a atacantes remotos detener el controlador de procesar el tr\u00e1fico de red que funciona bajo determinadas condiciones de uso de la red.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.2,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:N/A:P\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:ethernet_controller_x710_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"5.04\",\"matchCriteriaId\":\"F32F15AD-C473-4CA9-83C0-5C5A742F79D0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:ethernet_controller_x710-am2_sr1zp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC2A83AF-9369-4402-8A75-A3C475CBB3F6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:ethernet_controller_x710-am2_sr1zq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97B1C742-A502-4141-B5BF-E0CB369152C3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:ethernet_controller_x710-bm2_sllkb:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69B0751F-4A90-4904-ADE0-DEE514BF6250\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:ethernet_controller_x710-bm2_sllkc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51D6F374-62A0-42FC-B8D4-9C81FE88B9F9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:ethernet_controller_xl710-am1_sr1zm:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82C95EFE-2415-4BC3-870C-8FB417DAB28A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:ethernet_controller_xl710-am1_sr1zn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77AF59A1-845E-4CCF-8981-97781E424BD3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:ethernet_controller_xl710-am2_sr1zk:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9B8A610-92A4-4126-A28D-9D2C2A14EA71\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:ethernet_controller_xl710-am2_sr1zl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9922F300-F6B6-4577-B8BD-EEDC4B8BCE32\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:ethernet_controller_xl710-bm1_sllk9:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B150A489-45CC-4E9E-8EAB-17428027B3BF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:ethernet_controller_xl710-bm1_sllka:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D38675ED-3E60-4595-89A8-8CA1AB27BC46\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:ethernet_controller_xl710-bm2_sllk7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F15CBDA2-2C43-4217-B13A-22D3538F2661\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:ethernet_controller_xl710-bm2_sllk8:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AD4DFC6-B159-4A8B-8F9A-CE7BA50D9671\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:ethernet_controller_xl710_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"5.04\",\"matchCriteriaId\":\"8A146247-ECE2-48A3-A35F-01559274D237\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:eth_converged_ntwk_adptr_x710-da2_ex710da2g1p5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0411F19-A223-4B66-B931-E1BB18FBCB62\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:eth_converged_ntwk_adptr_x710-da4_ex710da4fhg1p5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9357AC7-6247-4228-BBAE-67020C74D38F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:eth_converged_ntwk_adptr_x710-da4_ex710da4g1p5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"626CD805-9C8D-434F-AA31-EB83D009076E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:eth_converged_ntwk_adptr_xl710-qda1_exl710qda1g1p5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAFA5E8B-C6F2-4EAA-A50B-92D858F82ED3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:eth_converged_ntwk_adptr_xl710-qda2_exl710qda2g1p5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8ABA5AB6-9A30-4852-87E3-F1594BE83750\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:ethernet_converged_network_adapter_x710-da2_x710da2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91BC4250-0C6D-4458-B9B5-AA4008C08EB3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:ethernet_converged_network_adapter_x710-da2_x710da2blk:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F11DB4C8-566C-448C-A18D-C625FA9DE11E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:ethernet_converged_network_adapter_x710-da2_x710da2g2p5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3B8147B-767F-49EF-9046-45BCFA2B2661\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:ethernet_converged_network_adapter_x710-da4_x710da4fh:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6709DAF-EE92-4110-8692-4A53C596CBE8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:ethernet_converged_network_adapter_x710-da4_x710da4fhblk:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A916CAF0-EDCF-40D5-968F-652E378FF97C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:ethernet_converged_network_adapter_x710-da4_x710da4fhg2p5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD026C34-293A-4DCD-874E-63BFE7116BDB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:ethernet_converged_network_adapter_x710-da4_x710da4g2p5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87965D8A-A5FD-4BD9-86F9-9E48E6108A06\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:ethernet_converged_network_adapter_xl710-qda1_xl710qda1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C438018-EC3A-4226-8252-1A77E5A50250\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:ethernet_converged_network_adapter_xl710-qda1_xl710qda1blk:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7254F006-9AD7-4837-ABB9-7A5A8327AD49\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:ethernet_converged_network_adapter_xl710-qda1_xl710qda1g2p5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9919B1A6-B5B9-4B54-89B6-FA3C17B13F48\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:ethernet_converged_network_adapter_xl710-qda2_xl710qda2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CC2E93B-DF2D-4442-9CA5-52F2BE36F411\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:ethernet_converged_network_adapter_xl710-qda2_xl710qda2blk:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84F67FE6-38C0-446C-8AD5-C9F713E188C1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:ethernet_converged_network_adapter_xl710-qda2_xl710qda2g2p5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30E51776-294A-449E-8EA9-49BD2725FBB1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:ethernet_i\\\\/o_module_xl710-qda1_axx1p40frtiom:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2E6BE9F-2333-4D14-94A0-90565430DCC1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:ethernet_i\\\\/o_module_xl710-qda2_axx2p40frtiom:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE2B9FB5-9868-42C7-96C8-464820F17D60\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hp:ethernet_10gb_2-port_562flr-sfp\\\\+:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA295D13-518D-4E43-B112-77D2A48F01AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hp:ethernet_10gb_2-port_562sfp\\\\+:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"280334EE-CDCF-4EBC-97D6-7FA1507BDF3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hp:ethernet_10gb_4-port_563sfp\\\\+:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31F9FCDB-CBD5-448C-B459-A90379A067E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hp:proliant_xl260a_g9_server:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0C39A32-1068-4C64-9609-E9E789221B2B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:lenovo:converged_hx_series:5.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B462A39A-B3CF-4D3D-B138-87EDCFCC2A36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:lenovo:converged_hx5500_appliance:5.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FE78714-3153-47EC-BA64-AB8EB2CE894C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:lenovo:converged_hx5510_appliance:5.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"638A62EA-C574-4359-84B1-046F49B5387E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:lenovo:converged_hx7500_appliance:5.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1670FD8-05F2-4F29-AA5F-ED97291BAFA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:lenovo:converged_hx7510_appliance:5.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3B66CB9-3FD9-47D5-9817-62371C1ECC22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:lenovo:nextscale_nx360_m5:5.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D4ECA79-BC4B-4888-A4DE-52492833B530\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:lenovo:system_x3250_m5:5.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"758D0933-1265-4593-8647-E20E0CC24A93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:lenovo:system_x3500_m5:5.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"686DB4DF-32A4-4FD4-A93E-E0E2171D4B9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:lenovo:system_x3550_m5:5.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F5D1172-A454-4550-9475-13834BE92A19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:lenovo:system_x3650_m5:5.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C040CE58-3A77-4689-BD61-8D82B6AE8128\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:lenovo:system_x3750_m4:5.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4098AC2-11F5-49C1-A4CB-570B1F3EBC82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:lenovo:system_x3850_x6:5.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A619F9E-AE80-4DC9-8DAD-B2123D005060\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:lenovo:system_x3950_x6:5.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F29E2DF-A1AD-4BA3-917A-1E86C9BAD49C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:lenovo:thinkagile_cx2200:5.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1825E3B4-D5B6-48E9-8395-047EB41E3A34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:lenovo:thinkagile_cx4200:5.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D8937BA-4BD8-40C7-B23D-A404252562A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:lenovo:thinkagile_cx4600:5.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBAC6BBC-B21E-437B-81D8-63021C69E55A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:lenovo:thinkserver_rd350:5.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23DDFE96-ED30-4818-AA30-CC009ACC4CCC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:lenovo:thinkserver_rd450:5.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40318330-EB26-4242-8378-A69F01C479F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:lenovo:thinkserver_rd550:5.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD58C401-31C3-48C9-B1AC-94706A98D286\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:lenovo:thinkserver_rd650:5.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C273581-6BAD-46F2-B865-0520B8F3ED65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:lenovo:thinkserver_sd350:5.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF56B9E8-D24C-420F-8661-ADB3052F92CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:lenovo:thinkserver_td350:5.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C9B0ED3-3686-442F-A1D2-96F61FFA117B\"}]}]}],\"references\":[{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg22002507\",\"source\":\"secure@intel.com\"},{\"url\":\"http://www.securityfocus.com/bid/95333\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1037562\",\"source\":\"secure@intel.com\"},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05368378\",\"source\":\"secure@intel.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00063\u0026languageid=en-fr\",\"source\":\"secure@intel.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20190731-0001/\",\"source\":\"secure@intel.com\"},{\"url\":\"https://support.lenovo.com/us/en/product_security/LEN-12029\",\"source\":\"secure@intel.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg22002507\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/95333\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1037562\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05368378\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00063\u0026languageid=en-fr\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20190731-0001/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.lenovo.com/us/en/product_security/LEN-12029\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.