VAR-201711-0644

Vulnerability from variot - Updated: 2023-12-18 12:19

Multiple buffer overflows in kernel in Intel Manageability Engine Firmware 11.0/11.5/11.6/11.7/11.10/11.20 allow attacker with local access to the system to execute arbitrary code. Intel Manageability Engine The Intel Management Engine is Intel's thermal management driver for its desktop family of chipsets. Local attackers can exploit these issues to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely result in denial-of-service conditions. Intel Xeon Processor E3-1200 and others are CPUs (Central Processing Units) of Intel Corporation. The following products and versions are affected: Intel Manageability Engine Firmware Version 11.0, Version 11.5, Version 11.6, Version 11.7, Version 11.10, Version 11.20; 6th, 7th, and 8th Generation Intel Core Processor Family; Intel Xeon Processor E3-1200 v5 and v6 Product Family; Intel Xeon Processor Scalable Family; Intel Xeon Processor W Family; Intel Atom C3000 Processor Family; Apollo Lake Intel Atom Processor E3900 series; Apollo Lake Intel Pentium; Celeron N and J series Processors

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201711-0644",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "manageability engine",
        "scope": "eq",
        "trust": 3.3,
        "vendor": "intel",
        "version": "11.7"
      },
      {
        "model": "manageability engine",
        "scope": "eq",
        "trust": 3.3,
        "vendor": "intel",
        "version": "11.6"
      },
      {
        "model": "manageability engine",
        "scope": "eq",
        "trust": 3.3,
        "vendor": "intel",
        "version": "11.5"
      },
      {
        "model": "manageability engine",
        "scope": "eq",
        "trust": 3.3,
        "vendor": "intel",
        "version": "11.20"
      },
      {
        "model": "manageability engine",
        "scope": "eq",
        "trust": 3.3,
        "vendor": "intel",
        "version": "11.10"
      },
      {
        "model": "manageability engine",
        "scope": "eq",
        "trust": 3.3,
        "vendor": "intel",
        "version": "11.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "manageability engine",
        "version": "11.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "manageability engine",
        "version": "11.5"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "manageability engine",
        "version": "11.6"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "manageability engine",
        "version": "11.7"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "manageability engine",
        "version": "11.10"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "manageability engine",
        "version": "11.20"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2e09270-39ab-11e9-9930-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-37849"
      },
      {
        "db": "BID",
        "id": "101917"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010519"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-5705"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-887"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:intel:manageability_engine_firmware:11.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:intel:manageability_engine_firmware:11.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:intel:manageability_engine_firmware:11.10:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:intel:manageability_engine_firmware:11.20:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:intel:manageability_engine_firmware:11.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:intel:manageability_engine_firmware:11.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-5705"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Mark Ermolov and Maxim Goryachy from Positive Technologies",
    "sources": [
      {
        "db": "BID",
        "id": "101917"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2017-5705",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.9,
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Local",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Complete",
            "baseScore": 7.2,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "CVE-2017-5705",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.9,
            "id": "CNVD-2017-37849",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.9,
            "id": "e2e09270-39ab-11e9-9930-000c29342cb1",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.9,
            "id": "VHN-113908",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "NVD",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.8,
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 7.8,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2017-5705",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2017-5705",
            "trust": 1.8,
            "value": "HIGH"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2017-37849",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201711-887",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "IVD",
            "id": "e2e09270-39ab-11e9-9930-000c29342cb1",
            "trust": 0.2,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-113908",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2e09270-39ab-11e9-9930-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-37849"
      },
      {
        "db": "VULHUB",
        "id": "VHN-113908"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010519"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-5705"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-887"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Multiple buffer overflows in kernel in Intel Manageability Engine Firmware 11.0/11.5/11.6/11.7/11.10/11.20 allow attacker with local access to the system to execute arbitrary code. Intel Manageability Engine The Intel Management Engine is Intel\u0027s thermal management driver for its desktop family of chipsets. \nLocal attackers can exploit these issues to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely result in denial-of-service conditions. Intel Xeon Processor E3-1200 and others are CPUs (Central Processing Units) of Intel Corporation. The following products and versions are affected: Intel Manageability Engine Firmware Version 11.0, Version 11.5, Version 11.6, Version 11.7, Version 11.10, Version 11.20; 6th, 7th, and 8th Generation Intel Core Processor Family; Intel Xeon Processor E3-1200 v5 and v6 Product Family; Intel Xeon Processor Scalable Family; Intel Xeon Processor W Family; Intel Atom C3000 Processor Family; Apollo Lake Intel Atom Processor E3900 series; Apollo Lake Intel Pentium; Celeron N and J series Processors",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-5705"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010519"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-37849"
      },
      {
        "db": "BID",
        "id": "101917"
      },
      {
        "db": "IVD",
        "id": "e2e09270-39ab-11e9-9930-000c29342cb1"
      },
      {
        "db": "VULHUB",
        "id": "VHN-113908"
      }
    ],
    "trust": 2.7
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2017-5705",
        "trust": 3.6
      },
      {
        "db": "BID",
        "id": "101917",
        "trust": 2.0
      },
      {
        "db": "SECTRACK",
        "id": "1039852",
        "trust": 1.1
      },
      {
        "db": "SIEMENS",
        "id": "SSA-892715",
        "trust": 1.1
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-887",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-37849",
        "trust": 0.8
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-18-060-01",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010519",
        "trust": 0.8
      },
      {
        "db": "IVD",
        "id": "E2E09270-39AB-11E9-9930-000C29342CB1",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-113908",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2e09270-39ab-11e9-9930-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-37849"
      },
      {
        "db": "VULHUB",
        "id": "VHN-113908"
      },
      {
        "db": "BID",
        "id": "101917"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010519"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-5705"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-887"
      }
    ]
  },
  "id": "VAR-201711-0644",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "e2e09270-39ab-11e9-9930-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-37849"
      },
      {
        "db": "VULHUB",
        "id": "VHN-113908"
      }
    ],
    "trust": 1.4869565
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2e09270-39ab-11e9-9930-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-37849"
      }
    ]
  },
  "last_update_date": "2023-12-18T12:19:20.302000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "INTEL-SA-00086",
        "trust": 0.8,
        "url": "https://security-center.intel.com/advisory.aspx?intelid=intel-sa-00086\u0026languageid=en-fr"
      },
      {
        "title": "NTAP-20171120-0001",
        "trust": 0.8,
        "url": "https://security.netapp.com/advisory/ntap-20171120-0001/"
      },
      {
        "title": "Patch for Intel Manageability Engine Buffer Overflow Vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/111461"
      },
      {
        "title": "Multiple Intel product Manageability Engine Firmware Buffer error vulnerability fix",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=76619"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-37849"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010519"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-887"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-113908"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010519"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-5705"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.5,
        "url": "https://security-center.intel.com/advisory.aspx?intelid=intel-sa-00086\u0026languageid=en-fr"
      },
      {
        "trust": 1.1,
        "url": "http://www.securityfocus.com/bid/101917"
      },
      {
        "trust": 1.1,
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf"
      },
      {
        "trust": 1.1,
        "url": "https://security.netapp.com/advisory/ntap-20171120-0001/"
      },
      {
        "trust": 1.1,
        "url": "https://www.asus.com/news/wzeltg5cjyaiwgj0"
      },
      {
        "trust": 1.1,
        "url": "https://www.synology.com/support/security/synology_sa_17_73"
      },
      {
        "trust": 1.1,
        "url": "https://twitter.com/ptsecurity_uk/status/938447926128291842"
      },
      {
        "trust": 1.1,
        "url": "http://www.securitytracker.com/id/1039852"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-5705"
      },
      {
        "trust": 0.8,
        "url": "https://www.us-cert.gov/ics/advisories/icsa-18-060-01"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-5705"
      },
      {
        "trust": 0.3,
        "url": "http://www.intel.com/content/www/us/en/homepage.html"
      },
      {
        "trust": 0.1,
        "url": "https://security-center.intel.com/advisory.aspx?intelid=intel-sa-00086\u0026amp;languageid=en-fr"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-37849"
      },
      {
        "db": "VULHUB",
        "id": "VHN-113908"
      },
      {
        "db": "BID",
        "id": "101917"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010519"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-5705"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-887"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "e2e09270-39ab-11e9-9930-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-37849"
      },
      {
        "db": "VULHUB",
        "id": "VHN-113908"
      },
      {
        "db": "BID",
        "id": "101917"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010519"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-5705"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-887"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-12-22T00:00:00",
        "db": "IVD",
        "id": "e2e09270-39ab-11e9-9930-000c29342cb1"
      },
      {
        "date": "2017-12-25T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-37849"
      },
      {
        "date": "2017-11-21T00:00:00",
        "db": "VULHUB",
        "id": "VHN-113908"
      },
      {
        "date": "2017-11-20T00:00:00",
        "db": "BID",
        "id": "101917"
      },
      {
        "date": "2017-12-18T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-010519"
      },
      {
        "date": "2017-11-21T14:29:00.290000",
        "db": "NVD",
        "id": "CVE-2017-5705"
      },
      {
        "date": "2017-11-22T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201711-887"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-12-22T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-37849"
      },
      {
        "date": "2018-05-11T00:00:00",
        "db": "VULHUB",
        "id": "VHN-113908"
      },
      {
        "date": "2017-12-19T22:37:00",
        "db": "BID",
        "id": "101917"
      },
      {
        "date": "2019-07-10T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-010519"
      },
      {
        "date": "2018-05-11T01:29:04.843000",
        "db": "NVD",
        "id": "CVE-2017-5705"
      },
      {
        "date": "2017-11-22T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201711-887"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "BID",
        "id": "101917"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-887"
      }
    ],
    "trust": 0.9
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Intel Manageability Engine Buffer Overflow Vulnerability",
    "sources": [
      {
        "db": "IVD",
        "id": "e2e09270-39ab-11e9-9930-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-37849"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Buffer overflow",
    "sources": [
      {
        "db": "IVD",
        "id": "e2e09270-39ab-11e9-9930-000c29342cb1"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-887"
      }
    ],
    "trust": 0.8
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…