CVE-2017-5706
HPE Security Bulletin HPESBHF03798 1
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Multiple buffer overflows in kernel in Intel Server Platform Services Firmware 4.0 allow attacker with local access to the system to execute arbitrary code.
Múltiples desbordamientos de búfer en el kernel en Intel Server Platform Services Firmware 4.0 permiten que un atacante con acceso local al sistema ejecute código arbitrario.
A vulnerability in HPE certain Gen10 Servers, DL20 Gen9, ML30 Gen9 and certain Apollo servers with Intel Server Platform Service (SPS) v4.0 are vulnerable to local Denial of Service and execution of arbitrary code. **Note:** Intel has identified security vulnerabilities which could potentially place impacted platforms at risk. An issue impacts Intel Server Platform Service (SPS) v4.0 used in certain HPE servers. The SPS/ME firmware used in Intels architecture can be compromised with physical access such that non-authenticated code may be executed in the SPS environment outside of the visibility of the user and operating system administrator. Intel has released new revisions of the Intel Server Platform Service (SPS) firmware to address this vulnerability. Revision 1 of this advisory.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-02-01 CVE Reserved
- 2017-11-21 CVE Published
- 2024-09-17 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (9)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/101906 | Third Party Advisory | |
http://www.securitytracker.com/id/1039955 | Third Party Advisory | |
https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf | X_refsource_confirm |
|
https://security.netapp.com/advisory/ntap-20171120-0001 | Issue Tracking |
|
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03798en_us | X_refsource_confirm | |
https://twitter.com/PTsecurity_UK/status/938447926128291842 | X_refsource_misc | |
https://www.asus.com/News/wzeltG5CjYaIwGJ0 | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html | 2018-05-11 |
URL | Date | SRC |
---|---|---|
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-fr | 2018-05-11 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Intel Search vendor "Intel" | Server Platform Services Firmware Search vendor "Intel" for product "Server Platform Services Firmware" | 4.0 Search vendor "Intel" for product "Server Platform Services Firmware" and version "4.0" | - |
Affected
|