2 results (0.039 seconds)

CVSS: 7.2EPSS: 0%CPEs: 28EXPL: 0

Buffer overflow in Intel Trusted Execution Technology (TXT) SINIT Authenticated Code Modules (ACM) in Intel Q67 Express, C202, C204, C206 Chipsets, and Mobile Intel QM67, and QS67 Chipset before 2nd_gen_i5_i7_SINIT_51.BIN Express; Intel Q57, 3450 Chipsets and Mobile Intel QM57 and QS57 Express Chipset before i5_i7_DUAL_SINIT_51.BIN and i7_QUAD_SINIT_51.BIN; Mobile Intel GM45, GS45, and PM45 Express Chipset before GM45_GS45_PM45_SINIT_51.BIN; Intel Q35 Express Chipsets before Q35_SINIT_51.BIN; and Intel 5520, 5500, X58, and 7500 Chipsets before SINIT ACM 1.1 allows local users to bypass the Trusted Execution Technology protection mechanism and perform other unspecified SINIT ACM functions via unspecified vectors. Desbordamiento de búfer en Intel Trusted Execution Technology (TXT) SINIT Authenticated Code Modules (ACM) en Intel Q67 Express, C202, C204, C206 Chipsets, y Mobile Intel QM67, y QS67 Chipset anterior a 2nd_gen_i5_i7_SINIT_51.BIN Express; Intel Q57, 3450 Chipsets y Mobile Intel QM57 y QS57 Express Chipset anterior a i5_i7_DUAL_SINIT_51.BIN y i7_QUAD_SINIT_51.BIN; Mobile Intel GM45, GS45, y PM45 Express Chipset anterior a GM45_GS45_PM45_SINIT_51.BIN; Intel Q35 Express Chipsets anterior a Q35_SINIT_51.BIN; y Intel 5520, 5500, X58, y 7500 Chipsets anterior a SINIT ACM 1.1 permite a usaurios locales saltarse el mecanismo de protección (Trusted Execution Technology)y llevar a cabo otras funciones (SNIT ACM) a través de vectores no especificados. • http://osvdb.org/77554 http://secunia.com/advisories/47096 http://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00030&languageid=en-fr http://theinvisiblethings.blogspot.com/2011/12/exploring-new-lands-on-intel-cpus-sinit.html https://exchange.xforce.ibmcloud.com/vulnerabilities/71625 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.2EPSS: 0%CPEs: 5EXPL: 0

Intel Q35, GM45, PM45 Express, Q45, and Q43 Express chipsets in the SINIT Authenticated Code Module (ACM), which allows local users to bypass the Trusted Execution Technology protection mechanism and gain privileges by modifying the MCHBAR register to point to an attacker-controlled region, which prevents the SENTER instruction from properly applying VT-d protection while an MLE is being loaded. Intel Q35, GM45, PM45 Express, Q45, Y Q43 Express chipsets en the SINIT Authenticated Code Module (ACM), permite a usuarios locales superar el mecanismo de Trusted Execution Technology y obtener privilegios por modificación del registro MCHBAR para que apunte a una región controlada por el atacantes, lo que impide a la instrucción SENTER la adecuada protección desde applying VT-d, mientras un MLE es cargado. • http://invisiblethingslab.com/resources/misc09/Another%20TXT%20Attack.pdf http://osvdb.org/61248 http://secunia.com/advisories/37900 http://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00021&languageid=en-fr http://theinvisiblethings.blogspot.com/2009/12/another-txt-attack.html http://www.securityfocus.com/bid/37430 http://www.securitytracker.com/id?1023382 http://www.vupen.com/english/advisories/2009/3618 https://exchange.xforce.ibmcloud.com/vulnerabilities/54963 • CWE-16: Configuration •