ID

VAR-200908-0072


CVE

CVE-2008-7096


TITLE

BIOS Have firmware Intel Desktop Vulnerabilities in accessing memory

Trust: 0.8

sources: JVNDB: JVNDB-2009-004361

DESCRIPTION

Intel Desktop and Intel Mobile Boards with BIOS firmware DQ35JO, DQ35MP, DP35DP, DG33FB, DG33BU, DG33TL, MGM965TW, D945GCPE, and DX38BT allows local administrators with ring 0 privileges to gain additional privileges and modify code that is running in System Management Mode, or access hypervisory memory as demonstrated at Black Hat 2008 by accessing certain remapping registers in Xen 3.3. Intel BIOS is prone to an unspecified privilege-escalation vulnerability. Successfully exploiting this issue will allow programs running with administrative (ring 0) privileges to modify code running in System Management Mode. Currently very few technical details are available. We will update this BID as more information emerges

Trust: 1.98

sources: NVD: CVE-2008-7096 // JVNDB: JVNDB-2009-004361 // BID: 30823 // VULHUB: VHN-37221

AFFECTED PRODUCTS

vendor:intelmodel:biosscope:eqversion:dq35jo

Trust: 2.4

vendor:intelmodel:biosscope:eqversion:dq35mp

Trust: 2.4

vendor:intelmodel:biosscope:eqversion:dp35dp

Trust: 2.4

vendor:intelmodel:biosscope:eqversion:dg33fb

Trust: 2.4

vendor:intelmodel:biosscope:eqversion:dg33bu

Trust: 2.4

vendor:intelmodel:biosscope:eqversion:dg33tl

Trust: 2.4

vendor:intelmodel:biosscope:eqversion:mgm965tw

Trust: 2.4

vendor:intelmodel:biosscope:eqversion:dx38bt

Trust: 2.4

vendor:intelmodel:biosscope:eqversion:d945gcpe

Trust: 0.8

vendor:intelmodel:bios tw96510j.86a.1157scope: - version: -

Trust: 0.3

vendor:intelmodel:bios pe94510m.0050.20.86ascope: - version: -

Trust: 0.3

vendor:intelmodel:bios joq3510j.86a.0942scope: - version: -

Trust: 0.3

vendor:intelmodel:bios dpp3510j.86a.0484scope: - version: -

Trust: 0.3

vendor:intelmodel:bios btx3810j.86a.1814scope: - version: -

Trust: 0.3

sources: BID: 30823 // JVNDB: JVNDB-2009-004361 // CNNVD: CNNVD-200908-423 // NVD: CVE-2008-7096

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-7096
value: MEDIUM

Trust: 1.0

NVD: CVE-2008-7096
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200908-423
value: MEDIUM

Trust: 0.6

VULHUB: VHN-37221
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2008-7096
severity: MEDIUM
baseScore: 6.9
vectorString: AV:L/AC:M/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.4
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-37221
severity: MEDIUM
baseScore: 6.9
vectorString: AV:L/AC:M/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.4
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-37221 // JVNDB: JVNDB-2009-004361 // CNNVD: CNNVD-200908-423 // NVD: CVE-2008-7096

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.9

sources: VULHUB: VHN-37221 // JVNDB: JVNDB-2009-004361 // NVD: CVE-2008-7096

THREAT TYPE

local

Trust: 0.9

sources: BID: 30823 // CNNVD: CNNVD-200908-423

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-200908-423

CONFIGURATIONS

sources: JVNDB: JVNDB-2009-004361

PATCH

title:INTEL-SA-00017url:http://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00017&languageid=en-fr

Trust: 0.8

sources: JVNDB: JVNDB-2009-004361

EXTERNAL IDS

db:NVDid:CVE-2008-7096

Trust: 2.8

db:BIDid:30823

Trust: 2.0

db:OSVDBid:49901

Trust: 1.7

db:JVNDBid:JVNDB-2009-004361

Trust: 0.8

db:CNNVDid:CNNVD-200908-423

Trust: 0.7

db:XFid:44676

Trust: 0.6

db:VULHUBid:VHN-37221

Trust: 0.1

sources: VULHUB: VHN-37221 // BID: 30823 // JVNDB: JVNDB-2009-004361 // CNNVD: CNNVD-200908-423 // NVD: CVE-2008-7096

REFERENCES

url:http://security-center.intel.com/advisory.aspx?intelid=intel-sa-00017&languageid=en-fr

Trust: 1.9

url:http://www.securityfocus.com/bid/30823

Trust: 1.7

url:http://invisiblethingslab.com/bh08/part2-full.pdf

Trust: 1.7

url:http://theinvisiblethings.blogspot.com/2008/08/attacking-xen-domu-vs-dom0.html

Trust: 1.7

url:http://theinvisiblethings.blogspot.com/2008/08/intel-patches-q35-bug.html

Trust: 1.7

url:http://osvdb.org/49901

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/44676

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-7096

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-7096

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/44676

Trust: 0.6

url:http://security-center.intel.com/advisory.aspx?intelid=intel-sa-00017&languageid=en-fr

Trust: 0.1

sources: VULHUB: VHN-37221 // BID: 30823 // JVNDB: JVNDB-2009-004361 // CNNVD: CNNVD-200908-423 // NVD: CVE-2008-7096

CREDITS

Rafal Wojtczuk and Joanna Rutkowska

Trust: 0.9

sources: BID: 30823 // CNNVD: CNNVD-200908-423

SOURCES

db:VULHUBid:VHN-37221
db:BIDid:30823
db:JVNDBid:JVNDB-2009-004361
db:CNNVDid:CNNVD-200908-423
db:NVDid:CVE-2008-7096

LAST UPDATE DATE

2024-11-23T22:31:52.078000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-37221date:2017-08-17T00:00:00
db:BIDid:30823date:2015-05-07T17:24:00
db:JVNDBid:JVNDB-2009-004361date:2012-09-25T00:00:00
db:CNNVDid:CNNVD-200908-423date:2009-08-28T00:00:00
db:NVDid:CVE-2008-7096date:2024-11-21T00:58:15.870

SOURCES RELEASE DATE

db:VULHUBid:VHN-37221date:2009-08-27T00:00:00
db:BIDid:30823date:2008-08-25T00:00:00
db:JVNDBid:JVNDB-2009-004361date:2012-09-25T00:00:00
db:CNNVDid:CNNVD-200908-423date:2009-08-27T00:00:00
db:NVDid:CVE-2008-7096date:2009-08-27T20:30:00.407