3 results (0.004 seconds)

CVSS: 7.2EPSS: 0%CPEs: 184EXPL: 0

Buffer overflow vulnerability in system firmware for Intel(R) Xeon(R) Processor D Family, Intel(R) Xeon(R) Scalable Processor, Intel(R) Server Board, Intel(R) Server System and Intel(R) Compute Module may allow a privileged user to potentially enable escalation of privilege and/or denial of service via local access. Una vulnerabilidad de desbordamiento de búfer en el firmware del sistema para Intel(R) Xeon(R) Processor D Family, Intel(R) Xeon(R) Scalable Processor, Intel(R) Server Board, Intel(R) Server System and Intel(R) Compute Module, puede permitir que un usuario privilegiado habilite potencialmente la escalada de privilegios y/o Denegación de Servicio (DoS) por medio del acceso local. • http://www.securityfocus.com/bid/108485 https://support.f5.com/csp/article/K85585101 https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00223.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.2EPSS: 0%CPEs: 140EXPL: 0

Improper memory initialization in Platform Sample/Silicon Reference firmware Intel(R) Server Board, Intel(R) Server System and Intel(R) Compute Module may allow privileged user to potentially enable an escalation of privilege via local access. La inicialización inadecuada en Platform Sample/Silicon Reference firmware Intel(R) Server Board, Intel(R) Server System and Intel(R) Compute Module) puede permitir que el usuario privilegiado habilite potencialmente una escalada de privilegios a través del acceso local. • https://security.netapp.com/advisory/ntap-20190318-0002 https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03912en_us https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03929en_us https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03978en_us https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00191.html • CWE-665: Improper Initialization •

CVSS: 8.2EPSS: 0%CPEs: 70EXPL: 0

BMC Firmware in Intel server boards, compute modules, and systems potentially allow an attacker with administrative privileges to make unauthorized read\writes to the SMBUS. El firmware BMC en las placas para servidores, los módulos de computación y los sistemas Intel podrían permitir que un atacante con privilegios administrativos realice lecturas/escrituras no autorizadas al SMBUS. • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00130.html • CWE-269: Improper Privilege Management •