ID

VAR-201909-1491


CVE

CVE-2019-11184


TITLE

plural Intel Product race condition vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2019-009428

DESCRIPTION

A race condition in specific microprocessors using Intel (R) DDIO cache allocation and RDMA may allow an authenticated user to potentially enable partial information disclosure via adjacent access. plural Intel The product contains a race condition vulnerability.Information may be obtained. Intel Xeon E5 and so on are the products of Intel Corporation of the United States. Intel Xeon E5 is a Xeon (Xeon) E5 series central processing unit (CPU). Intel Xeon E7 is a Xeon (Xeon) E7 series central processing unit (CPU). Intel Xeon SP is a scalable central processing unit (CPU) product. There are security vulnerabilities in Intel Xeon E5, E7, and SP series that support DDIO and RDMA. An attacker could use this vulnerability to leak information

Trust: 2.25

sources: NVD: CVE-2019-11184 // JVNDB: JVNDB-2019-009428 // CNVD: CNVD-2019-37172 // VULHUB: VHN-142805

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2019-37172

AFFECTED PRODUCTS

vendor:intelmodel:4110scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2687w v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-4650 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2698 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-4820 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:6126scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-4809 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-8891 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:5120tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:6138scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-4627 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-4610 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2667scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-1630 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2609 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-8870 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2630 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2665scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-4655 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2440 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-1620 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-2870 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2418l v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2637 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2640 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2620 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-8860 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2648l v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-2850 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2697 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2637 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-4628l v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-4809 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-8893 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2418lscope:eqversion: -

Trust: 1.0

vendor:intelmodel:6126tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-4650 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2418l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-1650 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-1660scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-4890 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-1650 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-8867 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2670 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-1660 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-4607 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2403scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-4820 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2450 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2690 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2670 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-4860 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-8870 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2648l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-8880 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:5119tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2630scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2650scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2699 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-8893 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-8880 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2698 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2643 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2420 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:5118scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2408l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-4607scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-1620 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-8870 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2683 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2603 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-4660 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2643 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2650l v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2630l v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2470 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2618l v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2650 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-8850 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-8893 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2660scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2630l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2630 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-2880 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-4617scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-4809 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2658 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2420scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2680scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2687w v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:4116scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2428l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-8880 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2658 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-8867 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-4880 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2628l v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2620scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2609 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-4620 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2683 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2690scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-1660 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-1680 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2695 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2603 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-4627 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2680 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2430l v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-4820 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2430scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2470scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-8890 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-4627 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2640 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2690 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-4650lscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-4669 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2637 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-1630 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-1660 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-1650 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-4870 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2407scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-4660 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2699 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2643 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-8894 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2440scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-1620scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-4640 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2450scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2660 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2670scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2630lscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2448l v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2658a v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:6130tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2438l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-4610 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2697a v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-4850 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2660 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2667 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2630l v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2680 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2699a v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2695 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:4109tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:4116tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-4620 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2699r v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-4657l v2scope:eqversion: -

Trust: 1.0

vendor:netappmodel:cloud backupscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-4650scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2618l v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-8880l v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2620 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2609 v4scope:eqversion: -

Trust: 1.0

vendor:netappmodel:steelstore cloud integrated storagescope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-4669 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2648lscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-8891 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-1428l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2643scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2407 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2603 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2697 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-4603scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2650l v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-4830 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2618l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2448lscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2623 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-4620scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-4603 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2680 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-4648 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-4830 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2640scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2608l v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2623 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2430 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2690 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-4667 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2660 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-4610scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2637scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2667 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2450lscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2628l v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-4850 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2695 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-4667 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2697 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-8880l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-8860 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-8890 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2628l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2603scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-4640 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2687w v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-4640 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-4610 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-4640scope:eqversion: -

Trust: 1.0

vendor:intelmodel:3106scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-4650 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-4655 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2430lscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-8891 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-8890 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2650lscope:eqversion: -

Trust: 1.0

vendor:intelmodel:4114tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2658 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2630 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-1428lscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-8857 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2620 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2609scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2648l v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2608l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2640 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-4620 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-4850 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2687wscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2650 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-4624l v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2428lscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-1428l v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2650l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2450l v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-2890 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-4830 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-1680 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:6130scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2650 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2428l v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2658scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-1620 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2403 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-1650scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2667 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:e5-2699ascope: - version: -

Trust: 0.8

vendor:intelmodel:e5-4610scope: - version: -

Trust: 0.8

vendor:intelmodel:e5-4620scope: - version: -

Trust: 0.8

vendor:intelmodel:e5-4627scope: - version: -

Trust: 0.8

vendor:intelmodel:e5-4628lscope: - version: -

Trust: 0.8

vendor:intelmodel:e5-4640scope: - version: -

Trust: 0.8

vendor:intelmodel:e5-4655scope: - version: -

Trust: 0.8

vendor:intelmodel:e5-4660scope: - version: -

Trust: 0.8

vendor:intelmodel:e5-4667scope: - version: -

Trust: 0.8

vendor:intelmodel:e5-4669scope: - version: -

Trust: 0.8

vendor:intelmodel:xeon e5scope: - version: -

Trust: 0.6

vendor:intelmodel:xeon e7scope: - version: -

Trust: 0.6

vendor:intelmodel:xeon spscope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2019-37172 // JVNDB: JVNDB-2019-009428 // NVD: CVE-2019-11184

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-11184
value: MEDIUM

Trust: 1.0

NVD: CVE-2019-11184
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2019-37172
value: LOW

Trust: 0.6

CNNVD: CNNVD-201909-628
value: MEDIUM

Trust: 0.6

VULHUB: VHN-142805
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2019-11184
severity: LOW
baseScore: 2.3
vectorString: AV:A/AC:M/AU:S/C:P/I:N/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 4.4
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: CVE-2019-11184
severity: LOW
baseScore: 2.9
vectorString: AV:A/AC:M/AU:N/C:P/I:N/A:N
accessVector: ADJACENT NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2019-37172
severity: LOW
baseScore: 2.9
vectorString: AV:A/AC:M/AU:N/C:P/I:N/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 5.5
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-142805
severity: LOW
baseScore: 2.9
vectorString: AV:A/AC:M/AU:N/C:P/I:N/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 5.5
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-11184
baseSeverity: MEDIUM
baseScore: 4.8
vectorString: CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: ADJACENT
attackComplexity: HIGH
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 1.2
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2019-11184
baseSeverity: MEDIUM
baseScore: 4.8
vectorString: CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: ADJACENT NETWORK
attackComplexity: HIGH
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2019-37172 // VULHUB: VHN-142805 // JVNDB: JVNDB-2019-009428 // CNNVD: CNNVD-201909-628 // NVD: CVE-2019-11184

PROBLEMTYPE DATA

problemtype:CWE-362

Trust: 1.9

sources: VULHUB: VHN-142805 // JVNDB: JVNDB-2019-009428 // NVD: CVE-2019-11184

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-201909-628

TYPE

competition condition problem

Trust: 0.6

sources: CNNVD: CNNVD-201909-628

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-009428

PATCH

title:INTEL-SA-00290url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00290.html

Trust: 0.8

sources: JVNDB: JVNDB-2019-009428

EXTERNAL IDS

db:NVDid:CVE-2019-11184

Trust: 3.1

db:JVNid:JVNVU93614443

Trust: 0.8

db:JVNDBid:JVNDB-2019-009428

Trust: 0.8

db:CNNVDid:CNNVD-201909-628

Trust: 0.7

db:CNVDid:CNVD-2019-37172

Trust: 0.6

db:LENOVOid:LEN-30550

Trust: 0.6

db:VULHUBid:VHN-142805

Trust: 0.1

sources: CNVD: CNVD-2019-37172 // VULHUB: VHN-142805 // JVNDB: JVNDB-2019-009428 // CNNVD: CNNVD-201909-628 // NVD: CVE-2019-11184

REFERENCES

url:https://security.netapp.com/advisory/ntap-20190926-0001/

Trust: 1.7

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00290.html

Trust: 1.7

url:https://arxiv.org/abs/1909.04841

Trust: 1.7

url:https://ieeexplore.ieee.org/document/9152768

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2019-11184

Trust: 1.4

url:https://vigilance.fr/vulnerability/intel-xeon-information-disclosure-via-ddio-netcat-30310

Trust: 1.2

url:https://support.f5.com/csp/article/k43220413

Trust: 1.1

url:https://support.f5.com/csp/article/k43220413?utm_source=f5support&amp%3butm_medium=rss

Trust: 1.0

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11184

Trust: 0.8

url:https://jvn.jp/vu/jvnvu93614443/

Trust: 0.8

url:https://support.f5.com/csp/article/k43220413?utm_source=f5support&utm_medium=rss

Trust: 0.6

url:https://support.lenovo.com/us/en/product_security/len-30550

Trust: 0.6

url:https://support.f5.com/csp/article/k43220413?utm_source=f5support&utm_medium=rss

Trust: 0.1

sources: CNVD: CNVD-2019-37172 // VULHUB: VHN-142805 // JVNDB: JVNDB-2019-009428 // CNNVD: CNNVD-201909-628 // NVD: CVE-2019-11184

SOURCES

db:CNVDid:CNVD-2019-37172
db:VULHUBid:VHN-142805
db:JVNDBid:JVNDB-2019-009428
db:CNNVDid:CNNVD-201909-628
db:NVDid:CVE-2019-11184

LAST UPDATE DATE

2024-11-23T19:46:26.238000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2019-37172date:2019-10-25T00:00:00
db:VULHUBid:VHN-142805date:2019-09-18T00:00:00
db:JVNDBid:JVNDB-2019-009428date:2019-09-20T00:00:00
db:CNNVDid:CNNVD-201909-628date:2022-05-05T00:00:00
db:NVDid:CVE-2019-11184date:2024-11-21T04:20:41.057

SOURCES RELEASE DATE

db:CNVDid:CNVD-2019-37172date:2019-10-25T00:00:00
db:VULHUBid:VHN-142805date:2019-09-16T00:00:00
db:JVNDBid:JVNDB-2019-009428date:2019-09-20T00:00:00
db:CNNVDid:CNNVD-201909-628date:2019-09-11T00:00:00
db:NVDid:CVE-2019-11184date:2019-09-16T16:15:10.147