Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-0103 (GCVE-0-2019-0103)
Vulnerability from cvelistv5 – Published: 2019-02-18 17:00 – Updated: 2024-09-16 23:36- n/a
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T17:37:07.549Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "107074",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/107074"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-050-01"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2019-02-12T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Insufficient file protection in install routine for Intel(R) Data Center Manager SDK before version 5.0.2 may allow an authenticated user to potentially enable information disclosure via local access."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-02-27T21:57:01",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"name": "107074",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/107074"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-050-01"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"DATE_PUBLIC": "2019-02-12T00:00:00",
"ID": "CVE-2019-0103",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Insufficient file protection in install routine for Intel(R) Data Center Manager SDK before version 5.0.2 may allow an authenticated user to potentially enable information disclosure via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "107074",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/107074"
},
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-19-050-01",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-050-01"
},
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html",
"refsource": "CONFIRM",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2019-0103",
"datePublished": "2019-02-18T17:00:00Z",
"dateReserved": "2018-11-13T00:00:00",
"dateUpdated": "2024-09-16T23:36:54.481Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:intel:data_center_manager:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"5.0.2\", \"matchCriteriaId\": \"A9CFEB9D-54FC-4F61-851D-37D4CACCC09F\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Insufficient file protection in install routine for Intel(R) Data Center Manager SDK before version 5.0.2 may allow an authenticated user to potentially enable information disclosure via local access.\"}, {\"lang\": \"es\", \"value\": \"Una protecci\\u00f3n de archivos insuficiente en una rutina de instalaci\\u00f3n para Intel \\u00ae Data Center Manager SDK, en versiones anteriores a la 5.0.2, podr\\u00eda permitir a un usuario autenticado habilitar una divulgaci\\u00f3n de informaci\\u00f3n mediante un acceso local.\"}]",
"id": "CVE-2019-0103",
"lastModified": "2024-11-21T04:16:14.110",
"metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\", \"baseScore\": 5.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:N/C:P/I:N/A:N\", \"baseScore\": 2.1, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"LOW\", \"exploitabilityScore\": 3.9, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2019-02-18T17:29:00.440",
"references": "[{\"url\": \"http://www.securityfocus.com/bid/107074\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://ics-cert.us-cert.gov/advisories/ICSA-19-050-01\", \"source\": \"secure@intel.com\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html\", \"source\": \"secure@intel.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/107074\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://ics-cert.us-cert.gov/advisories/ICSA-19-050-01\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "secure@intel.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2019-0103\",\"sourceIdentifier\":\"secure@intel.com\",\"published\":\"2019-02-18T17:29:00.440\",\"lastModified\":\"2024-11-21T04:16:14.110\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Insufficient file protection in install routine for Intel(R) Data Center Manager SDK before version 5.0.2 may allow an authenticated user to potentially enable information disclosure via local access.\"},{\"lang\":\"es\",\"value\":\"Una protecci\u00f3n de archivos insuficiente en una rutina de instalaci\u00f3n para Intel \u00ae Data Center Manager SDK, en versiones anteriores a la 5.0.2, podr\u00eda permitir a un usuario autenticado habilitar una divulgaci\u00f3n de informaci\u00f3n mediante un acceso local.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":2.1,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:intel:data_center_manager:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.0.2\",\"matchCriteriaId\":\"A9CFEB9D-54FC-4F61-851D-37D4CACCC09F\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/107074\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://ics-cert.us-cert.gov/advisories/ICSA-19-050-01\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/107074\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://ics-cert.us-cert.gov/advisories/ICSA-19-050-01\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
CNVD-2019-05275
Vulnerability from cnvd - Published: 2019-02-26厂商已发布漏洞修复程序,请及时关注更新: https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html
| Name | Intel Data Center Manager SDK <5.0.2 |
|---|
{
"bids": {
"bid": {
"bidNumber": "107074"
}
},
"cves": {
"cve": {
"cveNumber": "CVE-2019-0103"
}
},
"description": "Intel Data Center Manager SDK\u662f\u7f8e\u56fd\u82f1\u7279\u5c14\uff08Intel\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u6570\u636e\u4e2d\u5fc3\u7ba1\u7406SDK\uff08\u8f6f\u4ef6\u5f00\u53d1\u5de5\u5177\u5305\uff09\u3002\u8be5\u4ea7\u54c1\u4e3b\u8981\u63d0\u4f9b\u8bbe\u5907\u5b9e\u65f6\u7535\u6e90\u548c\u6563\u70ed\u6570\u636e\u3002\n\nIntel(R) Data Center Manager SDK 5.0.2\u4e4b\u524d\u7248\u672c\u4e2d\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7a0b\u5e8f\u672a\u80fd\u5145\u5206\u5730\u4fdd\u62a4\u6587\u4ef6\u3002\u672c\u5730\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6cc4\u9732\u4fe1\u606f\u3002",
"discovererName": "DCG Red Team",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2019-05275",
"openTime": "2019-02-26",
"patchDescription": "Intel Data Center Manager SDK\u662f\u7f8e\u56fd\u82f1\u7279\u5c14\uff08Intel\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u6570\u636e\u4e2d\u5fc3\u7ba1\u7406SDK\uff08\u8f6f\u4ef6\u5f00\u53d1\u5de5\u5177\u5305\uff09\u3002\u8be5\u4ea7\u54c1\u4e3b\u8981\u63d0\u4f9b\u8bbe\u5907\u5b9e\u65f6\u7535\u6e90\u548c\u6563\u70ed\u6570\u636e\u3002\r\n\r\nIntel(R) Data Center Manager SDK 5.0.2\u4e4b\u524d\u7248\u672c\u4e2d\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7a0b\u5e8f\u672a\u80fd\u5145\u5206\u5730\u4fdd\u62a4\u6587\u4ef6\u3002\u672c\u5730\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6cc4\u9732\u4fe1\u606f\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Intel Data Center Manager SDK\u672c\u5730\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "Intel Data Center Manager SDK \u003c5.0.2"
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2019-0103",
"serverity": "\u4f4e",
"submitTime": "2019-02-19",
"title": "Intel Data Center Manager SDK\u672c\u5730\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e"
}
ICSA-19-050-01
Vulnerability from csaf_cisa - Published: 2019-02-19 00:00 - Updated: 2019-02-19 00:00Notes
{
"document": {
"acknowledgments": [
{
"organization": "Intel \u0027s Product Security Incident Response Team",
"summary": "reporting these vulnerabilities to NCCIC"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov",
"title": "CISA Disclaimer"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "summary",
"text": "Successful exploitation of these vulnerabilities may allow escalation of privilege, denial of service, or information disclosure.",
"title": "Risk evaluation"
},
{
"category": "other",
"text": "Information Technology",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "United States",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "NCCIC recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "NCCIC reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.NCCIC also provides a section for control systems security recommended practices on the ICS-CERT web page. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Additional mitigation guidance and recommended practices are publicly available on the ICS-CERT website in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to NCCIC for tracking and correlation against other incidents.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "NCCIC also recommends that users take the following measures to protect themselves from social engineering attacks:",
"title": "Recommended Practices"
},
{
"category": "other",
"text": "No known public exploits specifically target these vulnerabilities.",
"title": "Exploitability"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "ICS Advisory ICSA-19-050-01 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2019/icsa-19-050-01.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-19-050-01 Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-19-050-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-19-050-01"
}
],
"title": "Intel Data Center Manager SDK",
"tracking": {
"current_release_date": "2019-02-19T00:00:00.000000Z",
"generator": {
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-19-050-01",
"initial_release_date": "2019-02-19T00:00:00.000000Z",
"revision_history": [
{
"date": "2019-02-19T00:00:00.000000Z",
"legacy_version": "Initial",
"number": "1",
"summary": "ICSA-19-050-01 Intel Data Center Manager SDK"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 5.0.2",
"product": {
"name": "Intel Data Center Manager SDK: prior to Version 5.0.2",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "Intel Data Center Manager SDK"
}
],
"category": "vendor",
"name": "Intel"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-0102",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"notes": [
{
"category": "summary",
"text": "Insufficient session authentication may allow an unauthenticated user to enable escalation of privilege via network access.CVE-2019-0102 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-0102"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Intel recommends that affected users contact an Intel Data Center Manager SDK reseller for the Version 5.0.2 update. ",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.intel.com/content/www/us/en/software/intel-dcm-where-to-buy.html"
},
{
"category": "mitigation",
"details": "For more information, see Intel security advisory INTEL-SA-00215 ",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00215.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2019-0103",
"cwe": {
"id": "CWE-693",
"name": "Protection Mechanism Failure"
},
"notes": [
{
"category": "summary",
"text": "Insufficient file protection in the install routine may allow an authenticated user to enable information disclosure via local access. CVE-2019-0103 has been assigned to this vulnerability. A CVSS v3 base score of 5.5 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-0103"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Intel recommends that affected users contact an Intel Data Center Manager SDK reseller for the Version 5.0.2 update. ",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.intel.com/content/www/us/en/software/intel-dcm-where-to-buy.html"
},
{
"category": "mitigation",
"details": "For more information, see Intel security advisory INTEL-SA-00215 ",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00215.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2019-0104",
"cwe": {
"id": "CWE-693",
"name": "Protection Mechanism Failure"
},
"notes": [
{
"category": "summary",
"text": "Insufficient file protection in the uninstall routine may allow an authenticated user to enable information disclosure via local access. CVE-2019-0104 has been assigned to this vulnerability. A CVSS v3 base score of 5.5 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-0104"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Intel recommends that affected users contact an Intel Data Center Manager SDK reseller for the Version 5.0.2 update. ",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.intel.com/content/www/us/en/software/intel-dcm-where-to-buy.html"
},
{
"category": "mitigation",
"details": "For more information, see Intel security advisory INTEL-SA-00215 ",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00215.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2019-0105",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "summary",
"text": "Insufficient file permissions checking in the install routine may allow an authenticated user to enable escalation of privilege via local access.CVE-2019-0105 has been assigned to this vulnerability. A CVSS v3 base score of 6.7 has been calculated; the CVSS vector string is (AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-0105"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Intel recommends that affected users contact an Intel Data Center Manager SDK reseller for the Version 5.0.2 update. ",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.intel.com/content/www/us/en/software/intel-dcm-where-to-buy.html"
},
{
"category": "mitigation",
"details": "For more information, see Intel security advisory INTEL-SA-00215 ",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00215.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2019-0106",
"cwe": {
"id": "CWE-693",
"name": "Protection Mechanism Failure"
},
"notes": [
{
"category": "summary",
"text": "Insufficient run protection in the install routine may allow a privileged user to enable escalation of privilege via local access.CVE-2019-0106 has been assigned to this vulnerability. A CVSS v3 base score of 6.0 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-0106"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Intel recommends that affected users contact an Intel Data Center Manager SDK reseller for the Version 5.0.2 update. ",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.intel.com/content/www/us/en/software/intel-dcm-where-to-buy.html"
},
{
"category": "mitigation",
"details": "For more information, see Intel security advisory INTEL-SA-00215 ",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00215.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2019-0107",
"cwe": {
"id": "CWE-693",
"name": "Protection Mechanism Failure"
},
"notes": [
{
"category": "summary",
"text": "Insufficient user prompt in the install routine may allow a privileged user to enable escalation of privilege via local access.CVE-2019-0107 has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been calculated; the CVSS vector string is (AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-0107"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Intel recommends that affected users contact an Intel Data Center Manager SDK reseller for the Version 5.0.2 update. ",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.intel.com/content/www/us/en/software/intel-dcm-where-to-buy.html"
},
{
"category": "mitigation",
"details": "For more information, see Intel security advisory INTEL-SA-00215 ",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00215.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2019-0108",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "summary",
"text": "Improper file permissions may allow an authenticated user to enable disclosure of information via local access.CVE-2019-0108 has been assigned to this vulnerability. A CVSS v3 base score of 3.3 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-0108"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Intel recommends that affected users contact an Intel Data Center Manager SDK reseller for the Version 5.0.2 update. ",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.intel.com/content/www/us/en/software/intel-dcm-where-to-buy.html"
},
{
"category": "mitigation",
"details": "For more information, see Intel security advisory INTEL-SA-00215 ",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00215.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2019-0109",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "summary",
"text": "Improper folder permissions may allow an authenticated user to enable disclosure of information via local access.CVE-2019-0109 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-0109"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Intel recommends that affected users contact an Intel Data Center Manager SDK reseller for the Version 5.0.2 update. ",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.intel.com/content/www/us/en/software/intel-dcm-where-to-buy.html"
},
{
"category": "mitigation",
"details": "For more information, see Intel security advisory INTEL-SA-00215 ",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00215.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2019-0110",
"cwe": {
"id": "CWE-1391",
"name": "Use of Weak Credentials"
},
"notes": [
{
"category": "summary",
"text": "Insufficient key management may allow an authenticated user to enable information disclosure via local access.CVE-2019-0110 has been assigned to this vulnerability. A CVSS v3 base score of 7.1 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-0110"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Intel recommends that affected users contact an Intel Data Center Manager SDK reseller for the Version 5.0.2 update. ",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.intel.com/content/www/us/en/software/intel-dcm-where-to-buy.html"
},
{
"category": "mitigation",
"details": "For more information, see Intel security advisory INTEL-SA-00215 ",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00215.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2019-0111",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "summary",
"text": "Improper file permissions may allow an authenticated user to enable information disclosure via local access.CVE-2019-0111 has been assigned to this vulnerability. A CVSS v3 base score of 3.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-0111"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Intel recommends that affected users contact an Intel Data Center Manager SDK reseller for the Version 5.0.2 update. ",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.intel.com/content/www/us/en/software/intel-dcm-where-to-buy.html"
},
{
"category": "mitigation",
"details": "For more information, see Intel security advisory INTEL-SA-00215 ",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00215.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2019-0112",
"cwe": {
"id": "CWE-691",
"name": "Insufficient Control Flow Management"
},
"notes": [
{
"category": "summary",
"text": "Improper flow control in crypto routines may allow a privileged user to enable a denial of service via local access.CVE-2019-0112 has been assigned to this vulnerability. A CVSS v3 base score of 4.0 has been calculated; the CVSS vector string is (AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-0112"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Intel recommends that affected users contact an Intel Data Center Manager SDK reseller for the Version 5.0.2 update. ",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.intel.com/content/www/us/en/software/intel-dcm-where-to-buy.html"
},
{
"category": "mitigation",
"details": "For more information, see Intel security advisory INTEL-SA-00215 ",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00215.html"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001"
]
}
]
}
]
}
CERTFR-2019-AVI-108
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Intel. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Intel | N/A | Processeur Intel Celeron J4105 | ||
| Intel | N/A | Intel CSME versions 11.0 à 11.8.55 | ||
| Intel | N/A | Intel CSME versions 11.20 à 11.22.0 | ||
| Intel | N/A | Intel Data Center Manager SDK versions antérieures à 5.0.2 | ||
| Intel | N/A | Intel CSME versions 12.0 à 12.0.10 | ||
| Intel | N/A | Processeur Intel Celeron N4000 | ||
| Intel | N/A | Intel Accelerated Storage Manager RSTe versions 5.5 et antérieures | ||
| Intel | N/A | Intel Server Board | ||
| Intel | N/A | Intel Server System | ||
| Intel | N/A | Processeur Intel Core de 7ème génération | ||
| Intel | N/A | Intel Compute ModuleIntel Graphics Driver pour Windows versions antérieures à 10.18.x.5059 (aussi connu comme 15.33.x.5059), 10.18.x.5057 (aussi connu comme 15.36.x.5057), 20.19.x.5063 (aussi connu comme 15.40.x.5063) 21.20.x.5064 (aussi connu comme 15.45.x.5064) et 24.20.100.6373 | ||
| Intel | N/A | Intel CSME versions 11.10 à 11.11.55 | ||
| Intel | N/A | Intel Trusted Execution Engine versions 4.0 à 4.0.5 | ||
| Intel | N/A | Processeur Intel Core de 8ème génération | ||
| Intel | N/A | Processeur Intel Pentium Silver N5000 | ||
| Intel | N/A | Composant Intel Unite Solution software server version 3.2 à 3.3 | ||
| Intel | N/A | Processeur Intel Celeron N4100 | ||
| Intel | N/A | Intel Server Platform Services versions SPS 4.01.00.152.0 à SPS 4.01.02.173 | ||
| Intel | N/A | Intel Server Platform Services versions SPS 4.00.04.367 à SPS 4.00.04.382 | ||
| Intel | N/A | Processeur Intel Pentium Silver J5005 | ||
| Intel | N/A | Processeur Intel Celeron J4005 | ||
| Intel | N/A | Intel Trusted Execution Engine versions 3.0 à 3.1.50 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Processeur Intel Celeron J4105",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel CSME versions 11.0 \u00e0 11.8.55",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel CSME versions 11.20 \u00e0 11.22.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Data Center Manager SDK versions ant\u00e9rieures \u00e0 5.0.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel CSME versions 12.0 \u00e0 12.0.10",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Celeron N4000",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Accelerated Storage Manager RSTe versions 5.5 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server Board",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server System",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Core de 7\u00e8me g\u00e9n\u00e9ration",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Compute ModuleIntel Graphics Driver pour Windows versions ant\u00e9rieures \u00e0 10.18.x.5059 (aussi connu comme 15.33.x.5059), 10.18.x.5057 (aussi connu comme 15.36.x.5057), 20.19.x.5063 (aussi connu comme 15.40.x.5063) 21.20.x.5064 (aussi connu comme 15.45.x.5064) et 24.20.100.6373",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel CSME versions 11.10 \u00e0 11.11.55",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Trusted Execution Engine versions 4.0 \u00e0 4.0.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Core de 8\u00e8me g\u00e9n\u00e9ration",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Pentium Silver N5000",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Composant Intel Unite Solution software server version 3.2 \u00e0 3.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Celeron N4100",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server Platform Services versions SPS 4.01.00.152.0 \u00e0 SPS 4.01.02.173",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server Platform Services versions SPS 4.00.04.367 \u00e0 SPS 4.00.04.382",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Pentium Silver J5005",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Celeron J4005",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Trusted Execution Engine versions 3.0 \u00e0 3.1.50",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-12223",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12223"
},
{
"name": "CVE-2019-0108",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0108"
},
{
"name": "CVE-2018-12215",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12215"
},
{
"name": "CVE-2018-12188",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12188"
},
{
"name": "CVE-2018-12205",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12205"
},
{
"name": "CVE-2019-0103",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0103"
},
{
"name": "CVE-2018-12222",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12222"
},
{
"name": "CVE-2018-12212",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12212"
},
{
"name": "CVE-2018-12213",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12213"
},
{
"name": "CVE-2018-12202",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12202"
},
{
"name": "CVE-2018-12199",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12199"
},
{
"name": "CVE-2018-12221",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12221"
},
{
"name": "CVE-2019-0107",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0107"
},
{
"name": "CVE-2018-12191",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12191"
},
{
"name": "CVE-2018-12200",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12200"
},
{
"name": "CVE-2018-12204",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12204"
},
{
"name": "CVE-2018-12214",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12214"
},
{
"name": "CVE-2019-0105",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0105"
},
{
"name": "CVE-2018-18089",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18089"
},
{
"name": "CVE-2019-0109",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0109"
},
{
"name": "CVE-2018-12187",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12187"
},
{
"name": "CVE-2018-12219",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12219"
},
{
"name": "CVE-2019-0102",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0102"
},
{
"name": "CVE-2018-12192",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12192"
},
{
"name": "CVE-2018-12208",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12208"
},
{
"name": "CVE-2019-0101",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0101"
},
{
"name": "CVE-2018-12217",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12217"
},
{
"name": "CVE-2018-12189",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12189"
},
{
"name": "CVE-2018-12196",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12196"
},
{
"name": "CVE-2019-0135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0135"
},
{
"name": "CVE-2018-12201",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12201"
},
{
"name": "CVE-2018-12211",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12211"
},
{
"name": "CVE-2019-0106",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0106"
},
{
"name": "CVE-2018-12203",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12203"
},
{
"name": "CVE-2018-12209",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12209"
},
{
"name": "CVE-2019-0112",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0112"
},
{
"name": "CVE-2019-0110",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0110"
},
{
"name": "CVE-2018-12185",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12185"
},
{
"name": "CVE-2019-0111",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0111"
},
{
"name": "CVE-2018-12218",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12218"
},
{
"name": "CVE-2018-12220",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12220"
},
{
"name": "CVE-2018-12216",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12216"
},
{
"name": "CVE-2018-12224",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12224"
},
{
"name": "CVE-2019-0104",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0104"
},
{
"name": "CVE-2018-12210",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12210"
},
{
"name": "CVE-2018-12198",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12198"
},
{
"name": "CVE-2018-18090",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18090"
},
{
"name": "CVE-2018-12190",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12190"
},
{
"name": "CVE-2018-18091",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18091"
}
],
"links": [],
"reference": "CERTFR-2019-AVI-108",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-03-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service \u00e0 distance et un d\u00e9ni\nde service.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00189 du 12 mars 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00189.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00231 du 12 mars 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00231.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00215 du 12 mars 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00215.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00185 du 12 mars 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00185.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00214 du 12 mars 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00214.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00191 du 12 mars 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00191.html"
}
]
}
CERTFR-2019-AVI-108
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Intel. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Intel | N/A | Processeur Intel Celeron J4105 | ||
| Intel | N/A | Intel CSME versions 11.0 à 11.8.55 | ||
| Intel | N/A | Intel CSME versions 11.20 à 11.22.0 | ||
| Intel | N/A | Intel Data Center Manager SDK versions antérieures à 5.0.2 | ||
| Intel | N/A | Intel CSME versions 12.0 à 12.0.10 | ||
| Intel | N/A | Processeur Intel Celeron N4000 | ||
| Intel | N/A | Intel Accelerated Storage Manager RSTe versions 5.5 et antérieures | ||
| Intel | N/A | Intel Server Board | ||
| Intel | N/A | Intel Server System | ||
| Intel | N/A | Processeur Intel Core de 7ème génération | ||
| Intel | N/A | Intel Compute ModuleIntel Graphics Driver pour Windows versions antérieures à 10.18.x.5059 (aussi connu comme 15.33.x.5059), 10.18.x.5057 (aussi connu comme 15.36.x.5057), 20.19.x.5063 (aussi connu comme 15.40.x.5063) 21.20.x.5064 (aussi connu comme 15.45.x.5064) et 24.20.100.6373 | ||
| Intel | N/A | Intel CSME versions 11.10 à 11.11.55 | ||
| Intel | N/A | Intel Trusted Execution Engine versions 4.0 à 4.0.5 | ||
| Intel | N/A | Processeur Intel Core de 8ème génération | ||
| Intel | N/A | Processeur Intel Pentium Silver N5000 | ||
| Intel | N/A | Composant Intel Unite Solution software server version 3.2 à 3.3 | ||
| Intel | N/A | Processeur Intel Celeron N4100 | ||
| Intel | N/A | Intel Server Platform Services versions SPS 4.01.00.152.0 à SPS 4.01.02.173 | ||
| Intel | N/A | Intel Server Platform Services versions SPS 4.00.04.367 à SPS 4.00.04.382 | ||
| Intel | N/A | Processeur Intel Pentium Silver J5005 | ||
| Intel | N/A | Processeur Intel Celeron J4005 | ||
| Intel | N/A | Intel Trusted Execution Engine versions 3.0 à 3.1.50 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Processeur Intel Celeron J4105",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel CSME versions 11.0 \u00e0 11.8.55",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel CSME versions 11.20 \u00e0 11.22.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Data Center Manager SDK versions ant\u00e9rieures \u00e0 5.0.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel CSME versions 12.0 \u00e0 12.0.10",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Celeron N4000",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Accelerated Storage Manager RSTe versions 5.5 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server Board",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server System",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Core de 7\u00e8me g\u00e9n\u00e9ration",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Compute ModuleIntel Graphics Driver pour Windows versions ant\u00e9rieures \u00e0 10.18.x.5059 (aussi connu comme 15.33.x.5059), 10.18.x.5057 (aussi connu comme 15.36.x.5057), 20.19.x.5063 (aussi connu comme 15.40.x.5063) 21.20.x.5064 (aussi connu comme 15.45.x.5064) et 24.20.100.6373",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel CSME versions 11.10 \u00e0 11.11.55",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Trusted Execution Engine versions 4.0 \u00e0 4.0.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Core de 8\u00e8me g\u00e9n\u00e9ration",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Pentium Silver N5000",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Composant Intel Unite Solution software server version 3.2 \u00e0 3.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Celeron N4100",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server Platform Services versions SPS 4.01.00.152.0 \u00e0 SPS 4.01.02.173",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server Platform Services versions SPS 4.00.04.367 \u00e0 SPS 4.00.04.382",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Pentium Silver J5005",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Celeron J4005",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Trusted Execution Engine versions 3.0 \u00e0 3.1.50",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-12223",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12223"
},
{
"name": "CVE-2019-0108",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0108"
},
{
"name": "CVE-2018-12215",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12215"
},
{
"name": "CVE-2018-12188",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12188"
},
{
"name": "CVE-2018-12205",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12205"
},
{
"name": "CVE-2019-0103",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0103"
},
{
"name": "CVE-2018-12222",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12222"
},
{
"name": "CVE-2018-12212",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12212"
},
{
"name": "CVE-2018-12213",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12213"
},
{
"name": "CVE-2018-12202",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12202"
},
{
"name": "CVE-2018-12199",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12199"
},
{
"name": "CVE-2018-12221",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12221"
},
{
"name": "CVE-2019-0107",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0107"
},
{
"name": "CVE-2018-12191",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12191"
},
{
"name": "CVE-2018-12200",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12200"
},
{
"name": "CVE-2018-12204",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12204"
},
{
"name": "CVE-2018-12214",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12214"
},
{
"name": "CVE-2019-0105",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0105"
},
{
"name": "CVE-2018-18089",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18089"
},
{
"name": "CVE-2019-0109",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0109"
},
{
"name": "CVE-2018-12187",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12187"
},
{
"name": "CVE-2018-12219",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12219"
},
{
"name": "CVE-2019-0102",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0102"
},
{
"name": "CVE-2018-12192",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12192"
},
{
"name": "CVE-2018-12208",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12208"
},
{
"name": "CVE-2019-0101",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0101"
},
{
"name": "CVE-2018-12217",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12217"
},
{
"name": "CVE-2018-12189",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12189"
},
{
"name": "CVE-2018-12196",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12196"
},
{
"name": "CVE-2019-0135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0135"
},
{
"name": "CVE-2018-12201",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12201"
},
{
"name": "CVE-2018-12211",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12211"
},
{
"name": "CVE-2019-0106",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0106"
},
{
"name": "CVE-2018-12203",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12203"
},
{
"name": "CVE-2018-12209",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12209"
},
{
"name": "CVE-2019-0112",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0112"
},
{
"name": "CVE-2019-0110",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0110"
},
{
"name": "CVE-2018-12185",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12185"
},
{
"name": "CVE-2019-0111",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0111"
},
{
"name": "CVE-2018-12218",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12218"
},
{
"name": "CVE-2018-12220",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12220"
},
{
"name": "CVE-2018-12216",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12216"
},
{
"name": "CVE-2018-12224",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12224"
},
{
"name": "CVE-2019-0104",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0104"
},
{
"name": "CVE-2018-12210",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12210"
},
{
"name": "CVE-2018-12198",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12198"
},
{
"name": "CVE-2018-18090",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18090"
},
{
"name": "CVE-2018-12190",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12190"
},
{
"name": "CVE-2018-18091",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18091"
}
],
"links": [],
"reference": "CERTFR-2019-AVI-108",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-03-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service \u00e0 distance et un d\u00e9ni\nde service.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00189 du 12 mars 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00189.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00231 du 12 mars 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00231.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00215 du 12 mars 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00215.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00185 du 12 mars 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00185.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00214 du 12 mars 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00214.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00191 du 12 mars 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00191.html"
}
]
}
GSD-2019-0103
Vulnerability from gsd - Updated: 2023-12-13 01:23{
"GSD": {
"alias": "CVE-2019-0103",
"description": "Insufficient file protection in install routine for Intel(R) Data Center Manager SDK before version 5.0.2 may allow an authenticated user to potentially enable information disclosure via local access.",
"id": "GSD-2019-0103"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2019-0103"
],
"details": "Insufficient file protection in install routine for Intel(R) Data Center Manager SDK before version 5.0.2 may allow an authenticated user to potentially enable information disclosure via local access.",
"id": "GSD-2019-0103",
"modified": "2023-12-13T01:23:40.060590Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"DATE_PUBLIC": "2019-02-12T00:00:00",
"ID": "CVE-2019-0103",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Insufficient file protection in install routine for Intel(R) Data Center Manager SDK before version 5.0.2 may allow an authenticated user to potentially enable information disclosure via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "107074",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/107074"
},
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-19-050-01",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-050-01"
},
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html",
"refsource": "CONFIRM",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:intel:data_center_manager:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "5.0.2",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2019-0103"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Insufficient file protection in install routine for Intel(R) Data Center Manager SDK before version 5.0.2 may allow an authenticated user to potentially enable information disclosure via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html"
},
{
"name": "107074",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/107074"
},
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-19-050-01",
"refsource": "MISC",
"tags": [
"US Government Resource",
"Third Party Advisory"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-050-01"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
},
"lastModifiedDate": "2020-08-24T17:37Z",
"publishedDate": "2019-02-18T17:29Z"
}
}
}
VAR-201902-0791
Vulnerability from variot - Updated: 2023-12-18 12:00Insufficient file protection in install routine for Intel(R) Data Center Manager SDK before version 5.0.2 may allow an authenticated user to potentially enable information disclosure via local access. This product mainly provides real-time power supply and heat dissipation data of equipment
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201902-0791",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "data center manager",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "5.0.2"
},
{
"model": "data center manager sdk",
"scope": "lt",
"trust": 0.8,
"vendor": "intel",
"version": "5.0.2"
},
{
"model": "data center manager sdk",
"scope": "eq",
"trust": 0.3,
"vendor": "intel",
"version": "0"
},
{
"model": "data center manager sdk",
"scope": "ne",
"trust": 0.3,
"vendor": "intel",
"version": "5.0.2"
}
],
"sources": [
{
"db": "BID",
"id": "107074"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001860"
},
{
"db": "NVD",
"id": "CVE-2019-0103"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:intel:data_center_manager:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "5.0.2",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2019-0103"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Intel\u2019s Product Security Incident Response Team reported these vulnerabilities to NCCIC.,vendor ??,DCG Red Team",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201902-693"
}
],
"trust": 0.6
},
"cve": "CVE-2019-0103",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Local",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 2.1,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2019-0103",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Low",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "VHN-140134",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "LOW",
"trust": 0.1,
"vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 5.5,
"baseSeverity": "Medium",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2019-0103",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "Low",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2019-0103",
"trust": 1.8,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201902-693",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-140134",
"trust": 0.1,
"value": "LOW"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-140134"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001860"
},
{
"db": "NVD",
"id": "CVE-2019-0103"
},
{
"db": "CNNVD",
"id": "CNNVD-201902-693"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Insufficient file protection in install routine for Intel(R) Data Center Manager SDK before version 5.0.2 may allow an authenticated user to potentially enable information disclosure via local access. This product mainly provides real-time power supply and heat dissipation data of equipment",
"sources": [
{
"db": "NVD",
"id": "CVE-2019-0103"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001860"
},
{
"db": "BID",
"id": "107074"
},
{
"db": "VULHUB",
"id": "VHN-140134"
}
],
"trust": 1.98
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2019-0103",
"trust": 2.8
},
{
"db": "ICS CERT",
"id": "ICSA-19-050-01",
"trust": 2.8
},
{
"db": "BID",
"id": "107074",
"trust": 2.0
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001860",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201902-693",
"trust": 0.7
},
{
"db": "AUSCERT",
"id": "ESB-2019.0521",
"trust": 0.6
},
{
"db": "NSFOCUS",
"id": "42782",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-140134",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-140134"
},
{
"db": "BID",
"id": "107074"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001860"
},
{
"db": "NVD",
"id": "CVE-2019-0103"
},
{
"db": "CNNVD",
"id": "CNNVD-201902-693"
}
]
},
"id": "VAR-201902-0791",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-140134"
}
],
"trust": 0.01
},
"last_update_date": "2023-12-18T12:00:32.551000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "INTEL-SA-00215",
"trust": 0.8,
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00215.html"
},
{
"title": "Intel Data Center Manager SDK Security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=89515"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-001860"
},
{
"db": "CNNVD",
"id": "CNNVD-201902-693"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-noinfo",
"trust": 1.0
},
{
"problemtype": "CWE-200",
"trust": 0.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-140134"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001860"
},
{
"db": "NVD",
"id": "CVE-2019-0103"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.4,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-19-050-01"
},
{
"trust": 2.3,
"url": "http://www.securityfocus.com/bid/107074"
},
{
"trust": 2.0,
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00215.html"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-0103"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0103"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/75830"
},
{
"trust": 0.6,
"url": "http://www.nsfocus.net/vulndb/42782"
},
{
"trust": 0.3,
"url": "http://www.intel.com/"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-140134"
},
{
"db": "BID",
"id": "107074"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001860"
},
{
"db": "NVD",
"id": "CVE-2019-0103"
},
{
"db": "CNNVD",
"id": "CNNVD-201902-693"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-140134"
},
{
"db": "BID",
"id": "107074"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-001860"
},
{
"db": "NVD",
"id": "CVE-2019-0103"
},
{
"db": "CNNVD",
"id": "CNNVD-201902-693"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-02-18T00:00:00",
"db": "VULHUB",
"id": "VHN-140134"
},
{
"date": "2019-02-12T00:00:00",
"db": "BID",
"id": "107074"
},
{
"date": "2019-03-27T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-001860"
},
{
"date": "2019-02-18T17:29:00.440000",
"db": "NVD",
"id": "CVE-2019-0103"
},
{
"date": "2019-02-18T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201902-693"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-08-24T00:00:00",
"db": "VULHUB",
"id": "VHN-140134"
},
{
"date": "2019-02-12T00:00:00",
"db": "BID",
"id": "107074"
},
{
"date": "2019-03-27T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-001860"
},
{
"date": "2020-08-24T17:37:01.140000",
"db": "NVD",
"id": "CVE-2019-0103"
},
{
"date": "2020-08-25T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201902-693"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "BID",
"id": "107074"
},
{
"db": "CNNVD",
"id": "CNNVD-201902-693"
}
],
"trust": 0.9
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Intel(R) Data Center Manager SDK Vulnerable to information disclosure",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-001860"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "information disclosure",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201902-693"
}
],
"trust": 0.6
}
}
GHSA-WVC6-6486-QJ45
Vulnerability from github – Published: 2022-05-13 01:21 – Updated: 2022-05-13 01:21Insufficient file protection in install routine for Intel(R) Data Center Manager SDK before version 5.0.2 may allow an authenticated user to potentially enable information disclosure via local access.
{
"affected": [],
"aliases": [
"CVE-2019-0103"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2019-02-18T17:29:00Z",
"severity": "MODERATE"
},
"details": "Insufficient file protection in install routine for Intel(R) Data Center Manager SDK before version 5.0.2 may allow an authenticated user to potentially enable information disclosure via local access.",
"id": "GHSA-wvc6-6486-qj45",
"modified": "2022-05-13T01:21:10Z",
"published": "2022-05-13T01:21:10Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0103"
},
{
"type": "WEB",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-050-01"
},
{
"type": "WEB",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/107074"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
]
}
FKIE_CVE-2019-0103
Vulnerability from fkie_nvd - Published: 2019-02-18 17:29 - Updated: 2024-11-21 04:16| URL | Tags | ||
|---|---|---|---|
| secure@intel.com | http://www.securityfocus.com/bid/107074 | Third Party Advisory, VDB Entry | |
| secure@intel.com | https://ics-cert.us-cert.gov/advisories/ICSA-19-050-01 | Third Party Advisory, US Government Resource | |
| secure@intel.com | https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/107074 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-19-050-01 | Third Party Advisory, US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html | Vendor Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| intel | data_center_manager | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:intel:data_center_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A9CFEB9D-54FC-4F61-851D-37D4CACCC09F",
"versionEndExcluding": "5.0.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insufficient file protection in install routine for Intel(R) Data Center Manager SDK before version 5.0.2 may allow an authenticated user to potentially enable information disclosure via local access."
},
{
"lang": "es",
"value": "Una protecci\u00f3n de archivos insuficiente en una rutina de instalaci\u00f3n para Intel \u00ae Data Center Manager SDK, en versiones anteriores a la 5.0.2, podr\u00eda permitir a un usuario autenticado habilitar una divulgaci\u00f3n de informaci\u00f3n mediante un acceso local."
}
],
"id": "CVE-2019-0103",
"lastModified": "2024-11-21T04:16:14.110",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-02-18T17:29:00.440",
"references": [
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/107074"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-050-01"
},
{
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/107074"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-050-01"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html"
}
],
"sourceIdentifier": "secure@intel.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.