1 results (0.002 seconds)

CVSS: 7.2EPSS: 0%CPEs: 5EXPL: 0

Intel Q35, GM45, PM45 Express, Q45, and Q43 Express chipsets in the SINIT Authenticated Code Module (ACM), which allows local users to bypass the Trusted Execution Technology protection mechanism and gain privileges by modifying the MCHBAR register to point to an attacker-controlled region, which prevents the SENTER instruction from properly applying VT-d protection while an MLE is being loaded. Intel Q35, GM45, PM45 Express, Q45, Y Q43 Express chipsets en the SINIT Authenticated Code Module (ACM), permite a usuarios locales superar el mecanismo de Trusted Execution Technology y obtener privilegios por modificación del registro MCHBAR para que apunte a una región controlada por el atacantes, lo que impide a la instrucción SENTER la adecuada protección desde applying VT-d, mientras un MLE es cargado. • http://invisiblethingslab.com/resources/misc09/Another%20TXT%20Attack.pdf http://osvdb.org/61248 http://secunia.com/advisories/37900 http://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00021&languageid=en-fr http://theinvisiblethings.blogspot.com/2009/12/another-txt-attack.html http://www.securityfocus.com/bid/37430 http://www.securitytracker.com/id?1023382 http://www.vupen.com/english/advisories/2009/3618 https://exchange.xforce.ibmcloud.com/vulnerabilities/54963 • CWE-16: Configuration •