Out of bounds read in some Intel(R) Server Board BMC firmware before version 2.90 may allow a privileged user to enable information disclosure via local access.
References
Link | Resource |
---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00839.html | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
History
18 May 2023, 22:56
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:intel:server_system_m50cyp2ur312_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:intel:server_system_d50tnp2mfalac:-:*:*:*:*:*:*:* cpe:2.3:h:intel:server_system_d50tnp2mhstac:-:*:*:*:*:*:*:* cpe:2.3:o:intel:server_system_m50cyp1ur212_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:intel:server_system_d50tnp1mhcpac_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:intel:server_system_d50tnp1mhcrac:-:*:*:*:*:*:*:* cpe:2.3:h:intel:server_system_d50tnp1mhcpac:-:*:*:*:*:*:*:* cpe:2.3:o:intel:server_system_d50tnp1mhcrlc_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:intel:server_system_m50cyp2ur208:-:*:*:*:*:*:*:* cpe:2.3:h:intel:server_system_d50tnp2mhsvac:-:*:*:*:*:*:*:* cpe:2.3:o:intel:server_system_d50tnp2mhsvac_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:intel:server_system_m50cyp2ur312:-:*:*:*:*:*:*:* cpe:2.3:o:intel:server_system_m50cyp2ur208_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:intel:server_system_d50tnp1mhcrlc:-:*:*:*:*:*:*:* cpe:2.3:h:intel:server_system_m50cyp1ur204:-:*:*:*:*:*:*:* cpe:2.3:h:intel:server_system_m50cyp1ur212:-:*:*:*:*:*:*:* cpe:2.3:o:intel:server_system_d50tnp1mhcrac_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:intel:server_system_d50tnp2mhstac_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:intel:server_system_d50tnp2mfalac_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:intel:server_system_m50cyp1ur204_firmware:*:*:*:*:*:*:*:* |
|
First Time |
Intel server System D50tnp2mfalac
Intel server System D50tnp1mhcrlc Intel server System M50cyp2ur312 Firmware Intel server System M50cyp1ur204 Firmware Intel server System M50cyp1ur212 Firmware Intel server System D50tnp2mhsvac Firmware Intel server System D50tnp2mfalac Firmware Intel server System D50tnp1mhcrlc Firmware Intel server System D50tnp2mhsvac Intel server System D50tnp1mhcrac Intel Intel server System M50cyp1ur204 Intel server System D50tnp1mhcpac Intel server System D50tnp1mhcpac Firmware Intel server System D50tnp2mhstac Firmware Intel server System M50cyp2ur208 Intel server System D50tnp2mhstac Intel server System M50cyp2ur312 Intel server System D50tnp1mhcrac Firmware Intel server System M50cyp2ur208 Firmware Intel server System M50cyp1ur212 |
|
CWE | CWE-125 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.4 |
References | (MISC) https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00839.html - Patch, Vendor Advisory |
10 May 2023, 14:38
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-05-10 14:15
Updated : 2023-11-07 04:08
NVD link : CVE-2023-24475
Mitre link : CVE-2023-24475
JSON object : View
Products Affected
intel
- server_system_m50cyp2ur208_firmware
- server_system_d50tnp2mhsvac_firmware
- server_system_d50tnp1mhcrlc_firmware
- server_system_d50tnp1mhcpac_firmware
- server_system_m50cyp2ur208
- server_system_m50cyp1ur212
- server_system_d50tnp1mhcrac_firmware
- server_system_m50cyp1ur204_firmware
- server_system_m50cyp1ur212_firmware
- server_system_m50cyp1ur204
- server_system_m50cyp2ur312
- server_system_d50tnp1mhcrlc
- server_system_d50tnp1mhcrac
- server_system_d50tnp2mfalac
- server_system_d50tnp2mhstac
- server_system_d50tnp2mhsvac
- server_system_m50cyp2ur312_firmware
- server_system_d50tnp2mfalac_firmware
- server_system_d50tnp1mhcpac
- server_system_d50tnp2mhstac_firmware
CWE
CWE-125
Out-of-bounds Read