ID

VAR-202102-0071


CVE

CVE-2020-12365


TITLE

Intel(R) Graphics Drivers  Buffer Error Vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2020-016076

DESCRIPTION

Untrusted pointer dereference in some Intel(R) Graphics Drivers before versions 15.33.51.5146, 15.45.32.5145, 15.36.39.5144 and 15.40.46.5143 may allow an authenticated user to potentially denial of service via local access. Intel(R) Graphics Drivers Is vulnerable to a buffer error.Denial of service (DoS) It may be put into a state. There is a security vulnerability in Intel Graphics Drivers. There is no information about this vulnerability at present. Please pay attention to CNNVD or manufacturer announcements at any time

Trust: 1.71

sources: NVD: CVE-2020-12365 // JVNDB: JVNDB-2020-016076 // VULHUB: VHN-165036

AFFECTED PRODUCTS

vendor:intelmodel:graphics driversscope:ltversion:15.33.51.5146

Trust: 1.0

vendor:intelmodel:graphics driversscope:gteversion:15.45

Trust: 1.0

vendor:intelmodel:graphics driversscope:gteversion:15.40.0.0

Trust: 1.0

vendor:intelmodel:graphics driversscope:ltversion:15.40.46.5143

Trust: 1.0

vendor:intelmodel:graphics driversscope:ltversion:15.36.39.5144

Trust: 1.0

vendor:intelmodel:graphics driversscope:gteversion:15.36

Trust: 1.0

vendor:intelmodel:graphics driversscope:ltversion:15.45.32.5145

Trust: 1.0

vendor:インテルmodel:intel graphics driversscope:eqversion: -

Trust: 0.8

vendor:インテルmodel:intel graphics driversscope:eqversion:15.45.32.5145

Trust: 0.8

vendor:インテルmodel:intel graphics driversscope:eqversion:15.36.39.5144

Trust: 0.8

vendor:インテルmodel:intel graphics driversscope:eqversion:15.33.51.5146

Trust: 0.8

vendor:インテルmodel:intel graphics driversscope:eqversion:15.40.46.5143

Trust: 0.8

sources: JVNDB: JVNDB-2020-016076 // NVD: CVE-2020-12365

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-12365
value: MEDIUM

Trust: 1.0

NVD: CVE-2020-12365
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202102-826
value: MEDIUM

Trust: 0.6

VULHUB: VHN-165036
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2020-12365
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:N/I:N/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-165036
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:N/I:N/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-12365
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2020-12365
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-165036 // JVNDB: JVNDB-2020-016076 // CNNVD: CNNVD-202102-826 // NVD: CVE-2020-12365

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.1

problemtype:Buffer error (CWE-119) [NVD Evaluation ]

Trust: 0.8

problemtype:CWE-476

Trust: 0.1

sources: VULHUB: VHN-165036 // JVNDB: JVNDB-2020-016076 // NVD: CVE-2020-12365

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202102-826

TYPE

code problem

Trust: 0.6

sources: CNNVD: CNNVD-202102-826

PATCH

title:INTEL-SA-00438url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html

Trust: 0.8

title:Intel Graphics Drivers Fixes for code issue vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=142200

Trust: 0.6

sources: JVNDB: JVNDB-2020-016076 // CNNVD: CNNVD-202102-826

EXTERNAL IDS

db:NVDid:CVE-2020-12365

Trust: 2.5

db:JVNid:JVNVU93808918

Trust: 0.8

db:JVNDBid:JVNDB-2020-016076

Trust: 0.8

db:LENOVOid:LEN-51723

Trust: 0.6

db:AUSCERTid:ESB-2021.0472

Trust: 0.6

db:CNNVDid:CNNVD-202102-826

Trust: 0.6

db:VULHUBid:VHN-165036

Trust: 0.1

sources: VULHUB: VHN-165036 // JVNDB: JVNDB-2020-016076 // CNNVD: CNNVD-202102-826 // NVD: CVE-2020-12365

REFERENCES

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2020-12365

Trust: 1.4

url:https://jvn.jp/vu/jvnvu93808918/index.html

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2021.0472

Trust: 0.6

url:https://support.lenovo.com/us/en/product_security/len-51723

Trust: 0.6

url:https://vigilance.fr/vulnerability/intel-graphics-drivers-multiple-vulnerabilities-34748

Trust: 0.6

sources: VULHUB: VHN-165036 // JVNDB: JVNDB-2020-016076 // CNNVD: CNNVD-202102-826 // NVD: CVE-2020-12365

SOURCES

db:VULHUBid:VHN-165036
db:JVNDBid:JVNDB-2020-016076
db:CNNVDid:CNNVD-202102-826
db:NVDid:CVE-2020-12365

LAST UPDATE DATE

2024-11-23T20:42:00.715000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-165036date:2021-07-21T00:00:00
db:JVNDBid:JVNDB-2020-016076date:2021-11-04T09:08:00
db:CNNVDid:CNNVD-202102-826date:2021-12-06T00:00:00
db:NVDid:CVE-2020-12365date:2024-11-21T04:59:35.290

SOURCES RELEASE DATE

db:VULHUBid:VHN-165036date:2021-02-17T00:00:00
db:JVNDBid:JVNDB-2020-016076date:2021-11-04T00:00:00
db:CNNVDid:CNNVD-202102-826date:2021-02-09T00:00:00
db:NVDid:CVE-2020-12365date:2021-02-17T15:15:12.750