wid-sec-w-2023-2906
Vulnerability from csaf_certbund
Published
2023-11-14 23:00
Modified
2024-08-05 22:00
Summary
Intel Prozessoren: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Der Prozessor ist das zentrale Rechenwerk eines Computers.
Angriff
Ein lokaler Angreifer kann mehrere Schwachstellen in verschiedenen Intel Prozessoren ausnutzen, um einen Denial of Service Angriff durchzuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern oder Informationen offenzulegen.
Betroffene Betriebssysteme
- BIOS/Firmware
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Der Prozessor ist das zentrale Rechenwerk eines Computers.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann mehrere Schwachstellen in verschiedenen Intel Prozessoren ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern oder Informationen offenzulegen.", "title": "Angriff" }, { "category": "general", "text": "- BIOS/Firmware", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-2906 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2906.json" }, { "category": "self", "summary": "WID-SEC-2023-2906 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2906" }, { "category": "external", "summary": "HP Security Bulletin HPSBHF03889 vom 2023-12-12", "url": "https://support.hp.com/us-en/document/ish_9818602-9818630-16/HPSBHF03889" }, { "category": "external", "summary": "DELL Security Update", "url": "https://www.dell.com/support/kbdoc/de-de/000221476/dsa-2024-058-security-update-for-dell-networker-vproxy-multiple-components-vulnerabilities" }, { "category": "external", "summary": "Dell Security Advisory DSA-2023-359 vom 2024-01-29", "url": "https://www.cybersecurity-help.cz/vdb/SB2024012949" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-091 vom 2024-03-12", "url": "https://www.dell.com/support/kbdoc/000222965/dsa-2024-=" }, { "category": "external", "summary": "Debian Security Advisory DLA-3690 vom 2023-12-16", "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00012.html" }, { "category": "external", "summary": "Intel Security Advisory INTEL-SA-00971 vom 2023-11-14", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html" }, { "category": "external", "summary": "Intel Security Advisory INTEL-SA-00950 vom 2023-11-14", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00950.html" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2023-E4CB865604 vom 2023-11-14", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-e4cb865604" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-12988 vom 2023-11-14", "url": "https://linux.oracle.com/errata/ELSA-2023-12988.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-12989 vom 2023-11-14", "url": "https://linux.oracle.com/errata/ELSA-2023-12989.html" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2023-3DFC0123B0 vom 2023-11-14", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-3dfc0123b0" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2023-40E71FE5B9 vom 2023-11-14", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-40e71fe5b9" }, { "category": "external", "summary": "Lenovo Multi-vendor BIOS Security Vulnerabilities", "url": "https://support.lenovo.com/de/de/product_security/ps500589-multi-vendor-bios-security-vulnerabilities-november-2023" }, { "category": "external", "summary": "Citrix Security Advisory CTX583037 vom 2023-11-15", "url": "https://support.citrix.com/article/CTX583037" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2023-2341 vom 2023-11-16", "url": "https://alas.aws.amazon.com/AL2/ALAS-2023-2341.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-12991 vom 2023-11-16", "url": "https://linux.oracle.com/errata/ELSA-2023-12991.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6485-1 vom 2023-11-17", "url": "https://ubuntu.com/security/notices/USN-6485-1" }, { "category": "external", "summary": "HP Security Bulletin HPSBHF03885 vom 2023-11-21", "url": "https://support.hp.com/us-en/document/ish_9677353-9677377-16/HPSBHF03885" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:4493-1 vom 2023-11-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-November/017130.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:4500-1 vom 2023-11-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-November/017131.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:4510-1 vom 2023-11-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-November/017138.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-5563 vom 2023-11-23", "url": "https://lists.debian.org/debian-security-announce/2023/msg00259.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2023-1890 vom 2023-12-04", "url": "https://alas.aws.amazon.com/ALAS-2023-1890.html" }, { "category": "external", "summary": "Dell Security Advisory DSA-2023-370 vom 2024-06-13", "url": "https://www.dell.com/support/kbdoc/de-de/000219353/dsa-2023-370-security-update-for-dell-poweredge-server-for-intel-november-2023-security-advisories-2023-4-ipu" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-F3692F8528 vom 2024-08-05", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-f3692f8528" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-96F3C3F3D3 vom 2024-08-05", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-96f3c3f3d3" } ], "source_lang": "en-US", "title": "Intel Prozessoren: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-08-05T22:00:00.000+00:00", "generator": { "date": "2024-08-15T18:01:35.014+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2023-2906", "initial_release_date": "2023-11-14T23:00:00.000+00:00", "revision_history": [ { "date": "2023-11-14T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-11-15T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Citrix und Amazon aufgenommen" }, { "date": "2023-11-16T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Oracle Linux und Ubuntu aufgenommen" }, { "date": "2023-11-20T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von HP aufgenommen" }, { "date": "2023-11-21T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-11-23T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2023-12-04T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2023-12-11T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates von HP aufgenommen" }, { "date": "2023-12-17T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2024-01-28T23:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Dell aufgenommen" }, { "date": "2024-01-29T23:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Dell aufgenommen" }, { "date": "2024-03-11T23:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Dell aufgenommen" }, { "date": "2024-06-13T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Dell aufgenommen" }, { "date": "2024-08-05T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Fedora aufgenommen" } ], "status": "final", "version": "14" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Citrix Systems Hypervisor", "product": { "name": "Citrix Systems Hypervisor", "product_id": "T016872", "product_identification_helper": { "cpe": "cpe:/o:citrix:hypervisor:-" } } }, { "category": "product_name", "name": "Citrix Systems XenServer", "product": { "name": "Citrix Systems XenServer", "product_id": "T004077", "product_identification_helper": { "cpe": "cpe:/a:citrix:xenserver:-" } } } ], "category": "vendor", "name": "Citrix Systems" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Dell Computer", "product": { "name": "Dell Computer", "product_id": "T006498", "product_identification_helper": { "cpe": "cpe:/o:dell:dell_computer:-" } } }, { "branches": [ { "category": "product_version_range", "name": "vProxy\u003c19.9.0.4", "product": { "name": "Dell NetWorker vProxy\u003c19.9.0.4", "product_id": "T032377" } }, { "category": "product_version_range", "name": "vProxy\u003c19.10", "product": { "name": "Dell NetWorker vProxy\u003c19.10", "product_id": "T032378" } }, { "category": "product_version_range", "name": "vProxy OVA \u003c19.9.0.5", "product": { "name": "Dell NetWorker vProxy OVA \u003c19.9.0.5", "product_id": "T033357" } } ], "category": "product_name", "name": "NetWorker" }, { "category": "product_name", "name": "Dell PowerEdge", "product": { "name": "Dell PowerEdge", "product_id": "T033533", "product_identification_helper": { "cpe": "cpe:/h:dell:poweredge:-" } } } ], "category": "vendor", "name": "Dell" }, { "branches": [ { "category": "product_name", "name": "Fedora Linux", "product": { "name": "Fedora Linux", "product_id": "74185", "product_identification_helper": { "cpe": "cpe:/o:fedoraproject:fedora:-" } } } ], "category": "vendor", "name": "Fedora" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "HP Computer", "product": { "name": "HP Computer", "product_id": "T023191", "product_identification_helper": { "cpe": "cpe:/h:hp:computer:-" } } }, { "category": "product_name", "name": "HP Computer", "product": { "name": "HP Computer", "product_id": "T030989", "product_identification_helper": { "cpe": "cpe:/h:hp:computer:-" } } } ], "category": "product_name", "name": "Computer" } ], "category": "vendor", "name": "HP" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Intel Prozessor", "product": { "name": "Intel Prozessor", "product_id": "T011586", "product_identification_helper": { "cpe": "cpe:/h:intel:intel_prozessor:-" } } }, { "category": "product_version_range", "name": "\u003cRadeon RX Vega M 23.10.01.46", "product": { "name": "Intel Prozessor \u003cRadeon RX Vega M 23.10.01.46", "product_id": "T031054" } } ], "category": "product_name", "name": "Prozessor" } ], "category": "vendor", "name": "Intel" }, { "branches": [ { "category": "product_name", "name": "Lenovo BIOS", "product": { "name": "Lenovo BIOS", "product_id": "T005651", "product_identification_helper": { "cpe": "cpe:/h:lenovo:bios:-" } } }, { "category": "product_name", "name": "Lenovo Computer", "product": { "name": "Lenovo Computer", "product_id": "T030470", "product_identification_helper": { "cpe": "cpe:/h:lenovo:computer:-" } } } ], "category": "vendor", "name": "Lenovo" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-46748", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Intel Prozessoren mit AMD Secure Processor. Diese ist auf einen Fehler hinsichtlich der Speichergrenzen zur\u00fcckzuf\u00fchren. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T004077", "T005651", "T006498", "T023191", "T032377", "T032378", "T033357", "T033533", "T004914", "T016872", "T030470", "74185", "2951", "T002207", "T000126", "T030989", "398363" ] }, "release_date": "2023-11-14T23:00:00.000+00:00", "title": "CVE-2021-46748" }, { "cve": "CVE-2023-20567", "notes": [ { "category": "description", "text": "In Intel Prozessoren mit integrierter Radeon RX Vega M Grafik existieren mehrere Schwachstellen. Diese sind auf einen Fehler in der Signaturpr\u00fcfung zur\u00fcckzuf\u00fchren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern und Programmcode auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T004077", "T005651", "T006498", "T023191", "T032377", "T032378", "T033357", "T033533", "T004914", "T016872", "T030470", "74185", "2951", "T002207", "T000126", "T030989", "398363" ] }, "release_date": "2023-11-14T23:00:00.000+00:00", "title": "CVE-2023-20567" }, { "cve": "CVE-2023-20568", "notes": [ { "category": "description", "text": "In Intel Prozessoren mit integrierter Radeon RX Vega M Grafik existieren mehrere Schwachstellen. Diese sind auf einen Fehler in der Signaturpr\u00fcfung zur\u00fcckzuf\u00fchren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern und Programmcode auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T004077", "T005651", "T006498", "T023191", "T032377", "T032378", "T033357", "T033533", "T004914", "T016872", "T030470", "74185", "2951", "T002207", "T000126", "T030989", "398363" ] }, "release_date": "2023-11-14T23:00:00.000+00:00", "title": "CVE-2023-20568" }, { "cve": "CVE-2023-23583", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in verschiedenen Intel Prozessoren. Spezielle Kombinationen von Prozessor-Instruktionen k\u00f6nnen zu ungew\u00fcnschtem Verhalten f\u00fchren. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren oder Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T004077", "T005651", "T006498", "T023191", "T032377", "T032378", "T033357", "T033533", "T011586", "T004914", "T016872", "T030470", "74185", "2951", "T002207", "T000126", "T030989", "398363" ] }, "release_date": "2023-11-14T23:00:00.000+00:00", "title": "CVE-2023-23583" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.