cnvd-2019-25499
Vulnerability from cnvd
Title
多款Intel产品信息泄露漏洞(CNVD-2019-25499)
Description
Intel Core X-series Processors等都是美国英特尔(Intel)公司的产品。Intel Core X-series Processors是一款X系列中央处理器(CPU)。4th Generation Intel Core i5 Processors是一款第四代Core i5系列中央处理器(CPU)。4th Generation Intel Core i3 Processors是一款第四代Core i3系列中央处理器(CPU)。
多款Intel产品中存在信息泄露漏洞,本地攻击者可利用该漏洞泄露部分的物理地址。
Severity
低
        VLAI Severity ?
      
      Formal description
厂商尚未提供漏洞修复方案,请关注厂商主页更新: https://www.intel.com/
Reference
https://support.lenovo.com/us/zh/product_security/len-27842
http://www.securityfocus.com/bid/108731
https://security.netapp.com/advisory/ntap-20190612-0001/
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html
Impacted products
          | Name | ['Intel Xeon Processor E3 v3 Family', 'Intel Xeon Processor E5 v3 Family', 'Intel Xeon Processor E7 v3 Family', 'Intel Core X-series Processors', 'Intel 4th Generation Intel Core i5 Processors', 'Intel 4th Generation Intel Core i3 Processors', 'Intel Pentium Processor G Series', 'Intel Pentium Processor 3000 Series', 'Intel Celeron Processor 2000 Series'] | 
|---|
{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2019-0174",
      "cveUrl": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0174"
    }
  },
  "description": "Intel Core X-series Processors\u7b49\u90fd\u662f\u7f8e\u56fd\u82f1\u7279\u5c14\uff08Intel\uff09\u516c\u53f8\u7684\u4ea7\u54c1\u3002Intel Core X-series Processors\u662f\u4e00\u6b3eX\u7cfb\u5217\u4e2d\u592e\u5904\u7406\u5668\uff08CPU\uff09\u30024th Generation Intel Core i5 Processors\u662f\u4e00\u6b3e\u7b2c\u56db\u4ee3Core i5\u7cfb\u5217\u4e2d\u592e\u5904\u7406\u5668\uff08CPU\uff09\u30024th Generation Intel Core i3 Processors\u662f\u4e00\u6b3e\u7b2c\u56db\u4ee3Core i3\u7cfb\u5217\u4e2d\u592e\u5904\u7406\u5668\uff08CPU\uff09\u3002\n\n\u591a\u6b3eIntel\u4ea7\u54c1\u4e2d\u5b58\u5728\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\uff0c\u672c\u5730\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6cc4\u9732\u90e8\u5206\u7684\u7269\u7406\u5730\u5740\u3002",
  "discovererName": "Andrew Kwong and Daniel Genkin\uff0cDaniel Gruss\uff0cYuval Yarom",
  "formalWay": "\u5382\u5546\u5c1a\u672a\u63d0\u4f9b\u6f0f\u6d1e\u4fee\u590d\u65b9\u6848\uff0c\u8bf7\u5173\u6ce8\u5382\u5546\u4e3b\u9875\u66f4\u65b0\uff1a\r\nhttps://www.intel.com/",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2019-25499",
  "openTime": "2019-08-02",
  "products": {
    "product": [
      "Intel Xeon Processor E3 v3 Family",
      "Intel Xeon Processor E5 v3 Family",
      "Intel Xeon Processor E7 v3 Family",
      "Intel Core X-series Processors",
      "Intel 4th Generation Intel Core i5 Processors",
      "Intel 4th Generation Intel Core i3 Processors",
      "Intel Pentium Processor G Series",
      "Intel Pentium Processor 3000 Series",
      "Intel Celeron Processor 2000 Series"
    ]
  },
  "referenceLink": "https://support.lenovo.com/us/zh/product_security/len-27842\r\nhttp://www.securityfocus.com/bid/108731\r\nhttps://security.netapp.com/advisory/ntap-20190612-0001/\r\nhttps://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html",
  "serverity": "\u4f4e",
  "submitTime": "2019-06-11",
  "title": "\u591a\u6b3eIntel\u4ea7\u54c1\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\uff08CNVD-2019-25499\uff09"
}
  Loading…
      Loading…
      Sightings
| Author | Source | Type | Date | 
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
 - Confirmed: The vulnerability is confirmed from an analyst perspective.
 - Published Proof of Concept: A public proof of concept is available for this vulnerability.
 - Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
 - Patched: This vulnerability was successfully patched by the user reporting the sighting.
 - Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
 - Not confirmed: The user expresses doubt about the veracity of the vulnerability.
 - Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
 
Loading…
      Loading…