CERTFR-2017-AVI-136
Vulnerability from certfr_avis

Une vulnérabilité a été corrigée dans les micrologiciels Intel. Elle permet à un attaquant de provoquer une exécution de code arbitraire à distance et une élévation de privilèges.

La vulnérabilité impacte le composant Advanced Management Technology (AMT) des micro-logiciels Intel vulnérables. AMT est une technologie Intel permettant d'administrer (surveiller la disponibilité, mettre à jour, redémarrer, etc.) des systèmes à distance via un canal de communication séparé du système d'exploitation. Les produits ISM (Intel Standard Manageability) et SBT (Small Business Technology) permettent d'accéder à un sous ensemble des fonctionnalités AMT.

Les produits AMT et ISM exposent la fonctionnalité vulnérable sur le réseau et permettraient à un attaquant la prise de contrôle à distance d'un système sans authentification au préalable.

D'autre part, un attaquant ayant un accès local au système vulnérable pourrait élever ses privilèges en exploitant cette vulnérabilité.

Intel a mis à disposition un guide permettant d'identifier si un système est vulnérable [1] ainsi qu'une procédure proposant des contre-mesures lorsque la mise à jour n'est pas disponible pour le composant impacté [2].

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Intel N/A Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), et Intel Small Business Technology versions 10.x antérieures à 10.0.55.3000
Intel N/A Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), et Intel Small Business Technology versions 9.5.x antérieures à 9.5.61.3012
Intel N/A Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), et Intel Small Business Technology versions 6.x antérieures à 6.2.61.3535
Intel N/A Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), et Intel Small Business Technology versions 8.x antérieures à 8.1.71.3608
Intel N/A Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), et Intel Small Business Technology versions 7.x antérieures à 7.1.91.3272
Intel N/A Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), et Intel Small Business Technology versions 11.5.x et 11.6.x antérieures à 11.6.27.3264
Intel N/A Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), et Intel Small Business Technology versions 9.0.x et 9.1.x antérieures à 9.1.41.3024
Intel N/A Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), et Intel Small Business Technology versions 11.0.x antérieures à 11.0.25.3001
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), et Intel Small Business Technology versions 10.x ant\u00e9rieures \u00e0 10.0.55.3000",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), et Intel Small Business Technology versions 9.5.x ant\u00e9rieures \u00e0 9.5.61.3012",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), et Intel Small Business Technology versions 6.x ant\u00e9rieures \u00e0 6.2.61.3535",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), et Intel Small Business Technology versions 8.x ant\u00e9rieures \u00e0 8.1.71.3608",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), et Intel Small Business Technology versions 7.x ant\u00e9rieures \u00e0 7.1.91.3272",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), et Intel Small Business Technology versions 11.5.x et 11.6.x ant\u00e9rieures \u00e0 11.6.27.3264",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), et Intel Small Business Technology versions 9.0.x et 9.1.x ant\u00e9rieures \u00e0 9.1.41.3024",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), et Intel Small Business Technology versions 11.0.x ant\u00e9rieures \u00e0 11.0.25.3001",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2017-5689",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-5689"
    }
  ],
  "initial_release_date": "2017-05-02T00:00:00",
  "last_revision_date": "2017-05-02T00:00:00",
  "links": [
    {
      "title": "1 Guide Intel",
      "url": "https://communities.intel.com/docs/DOC-5693"
    },
    {
      "title": "2 Contre-mesures Intel",
      "url": "https://downloadcenter.intel.com/download/26754"
    }
  ],
  "reference": "CERTFR-2017-AVI-136",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2017-05-02T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 corrig\u00e9e dans \u003cspan class=\"textit\"\u003eles\nmicrologiciels Intel\u003c/span\u003e. Elle permet \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance et une \u00e9l\u00e9vation de privil\u00e8ges.\n\nLa vuln\u00e9rabilit\u00e9 impacte le composant Advanced Management Technology\n(AMT) des micro-logiciels Intel vuln\u00e9rables. AMT est une technologie\nIntel permettant d\u0027administrer (surveiller la disponibilit\u00e9, mettre \u00e0\njour, red\u00e9marrer, etc.) des syst\u00e8mes \u00e0 distance via un canal de\ncommunication s\u00e9par\u00e9 du syst\u00e8me d\u0027exploitation. Les produits ISM (Intel\nStandard Manageability) et SBT (Small Business Technology) permettent\nd\u0027acc\u00e9der \u00e0 un sous ensemble des fonctionnalit\u00e9s AMT.\n\nLes produits AMT et ISM exposent la fonctionnalit\u00e9 vuln\u00e9rable sur le\nr\u00e9seau et permettraient \u00e0 un attaquant la prise de contr\u00f4le \u00e0 distance\nd\u0027un syst\u00e8me sans authentification au pr\u00e9alable.\n\nD\u0027autre part, un attaquant ayant un acc\u00e8s local au syst\u00e8me vuln\u00e9rable\npourrait \u00e9lever ses privil\u00e8ges en exploitant cette vuln\u00e9rabilit\u00e9.\n\nIntel a mis \u00e0 disposition un guide permettant d\u0027identifier si un syst\u00e8me\nest vuln\u00e9rable \\[1\\] ainsi qu\u0027une proc\u00e9dure proposant des contre-mesures\nlorsque la mise \u00e0 jour n\u0027est pas disponible pour le composant impact\u00e9\n\\[2\\].\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans les micrologiciels Intel",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00075 du 01 mai 2017",
      "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075\u0026languageid=en-fr"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…