ID

VAR-201906-0913


CVE

CVE-2019-0157


TITLE

Intel Multiple vulnerabilities in the product

Trust: 0.8

sources: JVNDB: JVNDB-2019-004980

DESCRIPTION

Insufficient input validation in the Intel(R) SGX driver for Linux may allow an authenticated user to potentially enable a denial of service via local access. Intel SGX Driver for Linux is prone to a local denial-of-service vulnerability. Attackers can exploit this issue to cause a denial-of-service condition. The following products are affected: Intel SGX Linux client driver prior to 2.5 Intel SGX DCAP Linux driver prior to 1.1

Trust: 1.17

sources: NVD: CVE-2019-0157 // BID: 108771

AFFECTED PRODUCTS

vendor:intelmodel:software guard extensions data center attestation primitivesscope:ltversion:1.1

Trust: 1.0

vendor:intelmodel:software guard extensionsscope:ltversion:2.5

Trust: 1.0

vendor:intelmodel:accelerated storage managerscope: - version: -

Trust: 0.8

vendor:intelmodel:chipset device softwarescope: - version: -

Trust: 0.8

vendor:intelmodel:compute cardscope: - version: -

Trust: 0.8

vendor:intelmodel:compute stickscope: - version: -

Trust: 0.8

vendor:intelmodel:core i3scope: - version: -

Trust: 0.8

vendor:intelmodel:core i5scope: - version: -

Trust: 0.8

vendor:intelmodel:core x-seriesscope: - version: -

Trust: 0.8

vendor:intelmodel:nuc kitscope: - version: -

Trust: 0.8

vendor:intelmodel:omni-path fabric manager guiscope: - version: -

Trust: 0.8

vendor:intelmodel:pentiumscope:eqversion:processor 2000 series

Trust: 0.8

vendor:intelmodel:pentiumscope:eqversion:processor 3000 series

Trust: 0.8

vendor:intelmodel:pentiumscope:eqversion:processor g series

Trust: 0.8

vendor:intelmodel:proset/wireless software driverscope: - version: -

Trust: 0.8

vendor:intelmodel:raid web console v3scope:eqversion:for windows

Trust: 0.8

vendor:intelmodel:sgx dcap linux driverscope: - version: -

Trust: 0.8

vendor:intelmodel:sgx linux client driverscope: - version: -

Trust: 0.8

vendor:intelmodel:turbo boost max technologyscope: - version: -

Trust: 0.8

vendor:intelmodel:xeonscope:eqversion:processor e7 v3 family

Trust: 0.8

vendor:intelmodel:xeonscope:eqversion:processor e7 v5 family

Trust: 0.8

vendor:intelmodel:xeonscope:eqversion:processor e7 v7 family

Trust: 0.8

vendor:intelmodel:ite tech* consumer infrared driverscope:eqversion:for windows 10

Trust: 0.8

vendor:intelmodel:open cloud integrity technologyscope: - version: -

Trust: 0.8

vendor:intelmodel:openattestationscope: - version: -

Trust: 0.8

vendor:intelmodel:software guard extensions linuxscope:eqversion:2.4

Trust: 0.3

vendor:intelmodel:software guard extensions dcap linuxscope:eqversion:1.0

Trust: 0.3

vendor:intelmodel:software guard extensions linuxscope:neversion:2.5

Trust: 0.3

vendor:intelmodel:software guard extensions dcap linuxscope:neversion:1.1

Trust: 0.3

sources: BID: 108771 // JVNDB: JVNDB-2019-004980 // NVD: CVE-2019-0157

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-0157
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-201906-565
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2019-0157
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:N/I:N/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

nvd@nist.gov: CVE-2019-0157
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 3.6
version: 3.0

Trust: 1.0

sources: CNNVD: CNNVD-201906-565 // NVD: CVE-2019-0157

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.0

sources: NVD: CVE-2019-0157

THREAT TYPE

local

Trust: 0.9

sources: BID: 108771 // CNNVD: CNNVD-201906-565

TYPE

Input Validation Error

Trust: 0.9

sources: BID: 108771 // CNNVD: CNNVD-201906-565

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-004980

PATCH

title:[INTEL-SA-00248] Open Cloud Integrity Technology and OpenAttestation Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html

Trust: 0.8

title:[INTEL-SA-00257] Intel Omni-Path Fabric Manager GUI Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00257.html

Trust: 0.8

title:[INTEL-SA-00259] Intel RAID Web Console 3 for Windows* Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html

Trust: 0.8

title:[INTEL-SA-00224] Intel Chipset Device Software (INF Update Utility) Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00224.html

Trust: 0.8

title:[INTEL-SA-00264] Intel NUC Firmware Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html

Trust: 0.8

title:[INTEL-SA-00226] Intel Accelerated Storage Manager in Intel Rapid Storage Technology Enterprise Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00226.html

Trust: 0.8

title:[INTEL-SA-00206] ITE Tech* Consumer Infrared Driver for Windows 10 Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00206.html

Trust: 0.8

title:[INTEL-SA-00232] Intel PROSet/Wireless WiFi Software Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html

Trust: 0.8

title:[INTEL-SA-00235] Intel SGX for Linux Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html

Trust: 0.8

title:[INTEL-SA-00243] Intel Turbo Boost Max Technology 3.0 Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html

Trust: 0.8

title:[INTEL-SA-00247] Partial Physical Address Leakage Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html

Trust: 0.8

title:Intel SGX Driver input verification error vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=93796

Trust: 0.6

sources: JVNDB: JVNDB-2019-004980 // CNNVD: CNNVD-201906-565

EXTERNAL IDS

db:NVDid:CVE-2019-0157

Trust: 2.7

db:BIDid:108771

Trust: 1.9

db:JVNid:JVNVU95572531

Trust: 0.8

db:JVNDBid:JVNDB-2019-004980

Trust: 0.8

db:CNNVDid:CNNVD-201906-565

Trust: 0.6

sources: BID: 108771 // JVNDB: JVNDB-2019-004980 // CNNVD: CNNVD-201906-565 // NVD: CVE-2019-0157

REFERENCES

url:http://www.securityfocus.com/bid/108771

Trust: 2.2

url:https://support.f5.com/csp/article/k10244523

Trust: 1.6

url:https://nvd.nist.gov/vuln/detail/cve-2019-0157

Trust: 1.4

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html

Trust: 1.0

url:http://www.intel.com/

Trust: 0.9

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html?wapkw=cve-2019-0157

Trust: 0.9

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0130

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0179

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11123

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0136

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0180

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11124

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0157

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0181

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11125

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0164

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0182

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11126

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11127

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0174

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0183

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11128

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0175

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11092

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11129

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3702

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0177

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11117

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0128

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0178

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11119

Trust: 0.8

url:http://jvn.jp/cert/jvnvu95572531

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0128

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0178

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-11119

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0130

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0179

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-11123

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0136

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0180

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-11124

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0181

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-11125

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0164

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0182

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-11126

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0174

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0183

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-11127

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0175

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-11092

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-11128

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-3702

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0177

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-11117

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-11129

Trust: 0.8

sources: BID: 108771 // JVNDB: JVNDB-2019-004980 // CNNVD: CNNVD-201906-565 // NVD: CVE-2019-0157

CREDITS

The vendor reported this issue.

Trust: 0.3

sources: BID: 108771

SOURCES

db:BIDid:108771
db:JVNDBid:JVNDB-2019-004980
db:CNNVDid:CNNVD-201906-565
db:NVDid:CVE-2019-0157

LAST UPDATE DATE

2024-11-23T21:29:39.357000+00:00


SOURCES UPDATE DATE

db:BIDid:108771date:2019-06-11T00:00:00
db:JVNDBid:JVNDB-2019-004980date:2019-06-13T00:00:00
db:CNNVDid:CNNVD-201906-565date:2019-06-26T00:00:00
db:NVDid:CVE-2019-0157date:2024-11-21T04:16:22.333

SOURCES RELEASE DATE

db:BIDid:108771date:2019-06-11T00:00:00
db:JVNDBid:JVNDB-2019-004980date:2019-06-13T00:00:00
db:CNNVDid:CNNVD-201906-565date:2019-06-13T00:00:00
db:NVDid:CVE-2019-0157date:2019-06-13T16:29:00.810