2 results (0.001 seconds)

CVSS: 6.9EPSS: 0%CPEs: 11EXPL: 0

Unspecified vulnerability in the Intel Trusted Execution Technology (TXT) SINIT Authenticated Code Modules (ACM) before 1.2, as used by the Intel QM77, QS77, Q77 Express, C216, Q67 Express, C202, C204, and C206 chipsets and Mobile Intel QM67 and QS67 chipsets, when the measured launch environment (MLE) is invoked, allows local users to bypass the Trusted Execution Technology protection mechanism and perform other unspecified SINIT ACM functions via unspecified vectors. Vulnerabilidad no especificada en Intel Trusted Execution Technology (TXT) SINIT Authenticated Code Modules (ACM) anteriores a v1.2, usados por Intel QM77, QS77, Q77 Express, C216, Q67 Express, C202, C204, y C206 chipsets y Mobile Intel QM67 y QS67 chipsets, cuando el measured launch environment (MLE) es invocado, permite a usuarios locales saltarse el mecanismo de protección (Trusted Execution Technology) y llevar a cabo otras funciones SINIT ACM no especificadas a través de vectores no especificados. • http://support.citrix.com/article/CTX138633 https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00035&languageid=en-fr •

CVSS: 7.2EPSS: 0%CPEs: 28EXPL: 0

Buffer overflow in Intel Trusted Execution Technology (TXT) SINIT Authenticated Code Modules (ACM) in Intel Q67 Express, C202, C204, C206 Chipsets, and Mobile Intel QM67, and QS67 Chipset before 2nd_gen_i5_i7_SINIT_51.BIN Express; Intel Q57, 3450 Chipsets and Mobile Intel QM57 and QS57 Express Chipset before i5_i7_DUAL_SINIT_51.BIN and i7_QUAD_SINIT_51.BIN; Mobile Intel GM45, GS45, and PM45 Express Chipset before GM45_GS45_PM45_SINIT_51.BIN; Intel Q35 Express Chipsets before Q35_SINIT_51.BIN; and Intel 5520, 5500, X58, and 7500 Chipsets before SINIT ACM 1.1 allows local users to bypass the Trusted Execution Technology protection mechanism and perform other unspecified SINIT ACM functions via unspecified vectors. Desbordamiento de búfer en Intel Trusted Execution Technology (TXT) SINIT Authenticated Code Modules (ACM) en Intel Q67 Express, C202, C204, C206 Chipsets, y Mobile Intel QM67, y QS67 Chipset anterior a 2nd_gen_i5_i7_SINIT_51.BIN Express; Intel Q57, 3450 Chipsets y Mobile Intel QM57 y QS57 Express Chipset anterior a i5_i7_DUAL_SINIT_51.BIN y i7_QUAD_SINIT_51.BIN; Mobile Intel GM45, GS45, y PM45 Express Chipset anterior a GM45_GS45_PM45_SINIT_51.BIN; Intel Q35 Express Chipsets anterior a Q35_SINIT_51.BIN; y Intel 5520, 5500, X58, y 7500 Chipsets anterior a SINIT ACM 1.1 permite a usaurios locales saltarse el mecanismo de protección (Trusted Execution Technology)y llevar a cabo otras funciones (SNIT ACM) a través de vectores no especificados. • http://osvdb.org/77554 http://secunia.com/advisories/47096 http://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00030&languageid=en-fr http://theinvisiblethings.blogspot.com/2011/12/exploring-new-lands-on-intel-cpus-sinit.html https://exchange.xforce.ibmcloud.com/vulnerabilities/71625 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •