Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-18091 (GCVE-0-2018-18091)
Vulnerability from cvelistv5 – Published: 2019-03-14 20:00 – Updated: 2024-09-17 02:36- Denial of Service
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Intel Corporation | Intel(R) Graphics Driver for Windows |
Affected:
Multiple versions.
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T11:01:14.823Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.lenovo.com/us/en/product_security/LEN-25084"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Intel(R) Graphics Driver for Windows",
"vendor": "Intel Corporation",
"versions": [
{
"status": "affected",
"version": "Multiple versions."
}
]
}
],
"datePublic": "2019-03-12T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Use after free in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 may allow an unprivileged user to potentially enable a denial of service via local access."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Denial of Service",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-04-04T18:06:06.000Z",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.lenovo.com/us/en/product_security/LEN-25084"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"DATE_PUBLIC": "2019-03-12T00:00:00",
"ID": "CVE-2018-18091",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Intel(R) Graphics Driver for Windows",
"version": {
"version_data": [
{
"version_value": "Multiple versions."
}
]
}
}
]
},
"vendor_name": "Intel Corporation"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Use after free in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 may allow an unprivileged user to potentially enable a denial of service via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Denial of Service"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html",
"refsource": "CONFIRM",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html"
},
{
"name": "https://support.lenovo.com/us/en/product_security/LEN-25084",
"refsource": "CONFIRM",
"url": "https://support.lenovo.com/us/en/product_security/LEN-25084"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2018-18091",
"datePublished": "2019-03-14T20:00:00.000Z",
"dateReserved": "2018-10-09T00:00:00.000Z",
"dateUpdated": "2024-09-17T02:36:54.051Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2018-18091
Vulnerability from fstec - Published: 12.03.2019{
"CVSS 2.0": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS 3.0": "AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Intel Corp.",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "15.40.34.4624 (Intel Graphics Driver), 15.40.36.4703 (Intel Graphics Driver), 15.40.37.4835 (Intel Graphics Driver), 15.45.18.4664 (Intel Graphics Driver), 15.45.19.4678 (Intel Graphics Driver), 15.45.21.4821 (Intel Graphics Driver), 15.45.23.4860 (Intel Graphics Driver), 15.33.43.4425 (Intel Graphics Driver), 15.33.45.4653 (Intel Graphics Driver), 15.33.46.4885 (Intel Graphics Driver), 15.36.26.4294 (Intel Graphics Driver), 15.36.28.4332 (Intel Graphics Driver), 15.36.31.4414 (Intel Graphics Driver), 15.36.33.4578 (Intel Graphics Driver), 15.36.34.4889 (Intel Graphics Driver), 15.40.38.4963 (Intel Graphics Driver), 15.40.41.5058 (Intel Graphics Driver), 24.20.100.6025 (Intel Graphics Driver), 24.20.100.6094 (Intel Graphics Driver), 24.20.100.6136 (Intel Graphics Driver), 24.20.100.6194 (Intel Graphics Driver), 24.20.100.6229 (Intel Graphics Driver), 24.20.100.6286 (Intel Graphics Driver)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439: \nhttps://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00189.html",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "12.03.2019",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "23.03.2021",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "12.04.2019",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2019-01381",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2018-18091",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Intel Graphics Driver",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 Kernel Mode Driver \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0430 \u0433\u0440\u0430\u0444\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c Intel Graphics Driver, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u043f\u043e\u0441\u043b\u0435 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u044f (CWE-416)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 Kernel Mode Driver \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0430 \u0433\u0440\u0430\u0444\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c Intel Graphics Driver \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u043f\u0430\u043c\u044f\u0442\u0438 \u043f\u043e\u0441\u043b\u0435 \u0435\u0451 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u044f. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": "-",
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00189.html\nhttps://nvd.nist.gov/vuln/detail/CVE-2018-18091",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-416",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 4,9)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5,8)"
}
CERTFR-2019-AVI-108
Vulnerability from certfr_avis - Published: 2019-03-13 - Updated: 2019-03-13
De multiples vulnérabilités ont été découvertes dans les produits Intel. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Intel | N/A | Processeur Intel Celeron J4105 | ||
| Intel | N/A | Intel CSME versions 11.0 à 11.8.55 | ||
| Intel | N/A | Intel CSME versions 11.20 à 11.22.0 | ||
| Intel | N/A | Intel Data Center Manager SDK versions antérieures à 5.0.2 | ||
| Intel | N/A | Intel CSME versions 12.0 à 12.0.10 | ||
| Intel | N/A | Processeur Intel Celeron N4000 | ||
| Intel | N/A | Intel Accelerated Storage Manager RSTe versions 5.5 et antérieures | ||
| Intel | N/A | Intel Server Board | ||
| Intel | N/A | Intel Server System | ||
| Intel | N/A | Processeur Intel Core de 7ème génération | ||
| Intel | N/A | Intel Compute ModuleIntel Graphics Driver pour Windows versions antérieures à 10.18.x.5059 (aussi connu comme 15.33.x.5059), 10.18.x.5057 (aussi connu comme 15.36.x.5057), 20.19.x.5063 (aussi connu comme 15.40.x.5063) 21.20.x.5064 (aussi connu comme 15.45.x.5064) et 24.20.100.6373 | ||
| Intel | N/A | Intel CSME versions 11.10 à 11.11.55 | ||
| Intel | N/A | Intel Trusted Execution Engine versions 4.0 à 4.0.5 | ||
| Intel | N/A | Processeur Intel Core de 8ème génération | ||
| Intel | N/A | Processeur Intel Pentium Silver N5000 | ||
| Intel | N/A | Composant Intel Unite Solution software server version 3.2 à 3.3 | ||
| Intel | N/A | Processeur Intel Celeron N4100 | ||
| Intel | N/A | Intel Server Platform Services versions SPS 4.01.00.152.0 à SPS 4.01.02.173 | ||
| Intel | N/A | Intel Server Platform Services versions SPS 4.00.04.367 à SPS 4.00.04.382 | ||
| Intel | N/A | Processeur Intel Pentium Silver J5005 | ||
| Intel | N/A | Processeur Intel Celeron J4005 | ||
| Intel | N/A | Intel Trusted Execution Engine versions 3.0 à 3.1.50 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Processeur Intel Celeron J4105",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel CSME versions 11.0 \u00e0 11.8.55",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel CSME versions 11.20 \u00e0 11.22.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Data Center Manager SDK versions ant\u00e9rieures \u00e0 5.0.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel CSME versions 12.0 \u00e0 12.0.10",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Celeron N4000",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Accelerated Storage Manager RSTe versions 5.5 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server Board",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server System",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Core de 7\u00e8me g\u00e9n\u00e9ration",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Compute ModuleIntel Graphics Driver pour Windows versions ant\u00e9rieures \u00e0 10.18.x.5059 (aussi connu comme 15.33.x.5059), 10.18.x.5057 (aussi connu comme 15.36.x.5057), 20.19.x.5063 (aussi connu comme 15.40.x.5063) 21.20.x.5064 (aussi connu comme 15.45.x.5064) et 24.20.100.6373",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel CSME versions 11.10 \u00e0 11.11.55",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Trusted Execution Engine versions 4.0 \u00e0 4.0.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Core de 8\u00e8me g\u00e9n\u00e9ration",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Pentium Silver N5000",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Composant Intel Unite Solution software server version 3.2 \u00e0 3.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Celeron N4100",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server Platform Services versions SPS 4.01.00.152.0 \u00e0 SPS 4.01.02.173",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server Platform Services versions SPS 4.00.04.367 \u00e0 SPS 4.00.04.382",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Pentium Silver J5005",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Celeron J4005",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Trusted Execution Engine versions 3.0 \u00e0 3.1.50",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-12223",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12223"
},
{
"name": "CVE-2019-0108",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0108"
},
{
"name": "CVE-2018-12215",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12215"
},
{
"name": "CVE-2018-12188",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12188"
},
{
"name": "CVE-2018-12205",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12205"
},
{
"name": "CVE-2019-0103",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0103"
},
{
"name": "CVE-2018-12222",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12222"
},
{
"name": "CVE-2018-12212",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12212"
},
{
"name": "CVE-2018-12213",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12213"
},
{
"name": "CVE-2018-12202",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12202"
},
{
"name": "CVE-2018-12199",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12199"
},
{
"name": "CVE-2018-12221",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12221"
},
{
"name": "CVE-2019-0107",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0107"
},
{
"name": "CVE-2018-12191",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12191"
},
{
"name": "CVE-2018-12200",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12200"
},
{
"name": "CVE-2018-12204",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12204"
},
{
"name": "CVE-2018-12214",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12214"
},
{
"name": "CVE-2019-0105",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0105"
},
{
"name": "CVE-2018-18089",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18089"
},
{
"name": "CVE-2019-0109",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0109"
},
{
"name": "CVE-2018-12187",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12187"
},
{
"name": "CVE-2018-12219",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12219"
},
{
"name": "CVE-2019-0102",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0102"
},
{
"name": "CVE-2018-12192",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12192"
},
{
"name": "CVE-2018-12208",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12208"
},
{
"name": "CVE-2019-0101",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0101"
},
{
"name": "CVE-2018-12217",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12217"
},
{
"name": "CVE-2018-12189",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12189"
},
{
"name": "CVE-2018-12196",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12196"
},
{
"name": "CVE-2019-0135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0135"
},
{
"name": "CVE-2018-12201",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12201"
},
{
"name": "CVE-2018-12211",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12211"
},
{
"name": "CVE-2019-0106",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0106"
},
{
"name": "CVE-2018-12203",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12203"
},
{
"name": "CVE-2018-12209",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12209"
},
{
"name": "CVE-2019-0112",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0112"
},
{
"name": "CVE-2019-0110",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0110"
},
{
"name": "CVE-2018-12185",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12185"
},
{
"name": "CVE-2019-0111",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0111"
},
{
"name": "CVE-2018-12218",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12218"
},
{
"name": "CVE-2018-12220",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12220"
},
{
"name": "CVE-2018-12216",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12216"
},
{
"name": "CVE-2018-12224",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12224"
},
{
"name": "CVE-2019-0104",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0104"
},
{
"name": "CVE-2018-12210",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12210"
},
{
"name": "CVE-2018-12198",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12198"
},
{
"name": "CVE-2018-18090",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18090"
},
{
"name": "CVE-2018-12190",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12190"
},
{
"name": "CVE-2018-18091",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18091"
}
],
"initial_release_date": "2019-03-13T00:00:00",
"last_revision_date": "2019-03-13T00:00:00",
"links": [],
"reference": "CERTFR-2019-AVI-108",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-03-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service \u00e0 distance et un d\u00e9ni\nde service.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00189 du 12 mars 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00189.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00231 du 12 mars 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00231.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00215 du 12 mars 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00215.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00185 du 12 mars 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00185.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00214 du 12 mars 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00214.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00191 du 12 mars 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00191.html"
}
]
}
CNVD-2019-26184
Vulnerability from cnvd - Published: 2019-08-06目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00189.html
| Name | ['Intel Graphics Driver for Windows <10.18.*.5059', 'Intel Graphics Driver for Windows <10.18.*.5057', 'Intel Graphics Driver for Windows <20.19.*.5063', 'Intel Graphics Driver for Windows <21.20.*.5064', 'Intel Graphics Driver for Windows <24.20.100.6373'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2018-18091",
"cveUrl": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18091"
}
},
"description": "Intel Graphics Driver for Windows\u662f\u7f8e\u56fd\u82f1\u7279\u5c14\uff08Intel\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u9002\u7528\u4e8eWindows\u5e73\u53f0\u7684\u663e\u5361\u9a71\u52a8\u7a0b\u5e8f\u3002Kernel Mode Driver\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u5185\u6838\u6a21\u5f0f\u9a71\u52a8\u7a0b\u5e8f\u3002\n\n\u57fa\u4e8eWindows\u5e73\u53f0\u7684Intel Graphics Driver\u4e2d\u7684Kernel Mode Driver\u5b58\u5728\u53cc\u91cd\u91ca\u653e\u6f0f\u6d1e\u3002\u672c\u5730\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u62d2\u7edd\u670d\u52a1\u3002",
"discovererName": "Intel",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00189.html",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2019-26184",
"openTime": "2019-08-06",
"patchDescription": "Intel Graphics Driver for Windows\u662f\u7f8e\u56fd\u82f1\u7279\u5c14\uff08Intel\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u9002\u7528\u4e8eWindows\u5e73\u53f0\u7684\u663e\u5361\u9a71\u52a8\u7a0b\u5e8f\u3002Kernel Mode Driver\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u5185\u6838\u6a21\u5f0f\u9a71\u52a8\u7a0b\u5e8f\u3002\r\n\r\n\u57fa\u4e8eWindows\u5e73\u53f0\u7684Intel Graphics Driver\u4e2d\u7684Kernel Mode Driver\u5b58\u5728\u53cc\u91cd\u91ca\u653e\u6f0f\u6d1e\u3002\u672c\u5730\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u62d2\u7edd\u670d\u52a1\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Intel Graphics Driver for Windows Kernel Mode Driver\u53cc\u91cd\u91ca\u653e\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"Intel Graphics Driver for Windows \u003c10.18.*.5059",
"Intel Graphics Driver for Windows \u003c10.18.*.5057",
"Intel Graphics Driver for Windows \u003c20.19.*.5063",
"Intel Graphics Driver for Windows \u003c21.20.*.5064",
"Intel Graphics Driver for Windows \u003c24.20.100.6373"
]
},
"referenceLink": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00189.html",
"serverity": "\u4f4e",
"submitTime": "2019-03-18",
"title": "Intel Graphics Driver for Windows Kernel Mode Driver\u53cc\u91cd\u91ca\u653e\u6f0f\u6d1e"
}
FKIE_CVE-2018-18091
Vulnerability from fkie_nvd - Published: 2019-03-14 20:29 - Updated: 2024-11-21 03:55| Vendor | Product | Version | |
|---|---|---|---|
| intel | graphics_driver | 15.33.43.4425 | |
| intel | graphics_driver | 15.33.45.4653 | |
| intel | graphics_driver | 15.33.46.4885 | |
| intel | graphics_driver | 15.36.26.4294 | |
| intel | graphics_driver | 15.36.28.4332 | |
| intel | graphics_driver | 15.36.31.4414 | |
| intel | graphics_driver | 15.36.33.4578 | |
| intel | graphics_driver | 15.36.34.4889 | |
| intel | graphics_driver | 15.40.34.4624 | |
| intel | graphics_driver | 15.40.36.4703 | |
| intel | graphics_driver | 15.40.37.4835 | |
| intel | graphics_driver | 15.40.38.4963 | |
| intel | graphics_driver | 15.40.41.5058 | |
| intel | graphics_driver | 15.45.18.4664 | |
| intel | graphics_driver | 15.45.19.4678 | |
| intel | graphics_driver | 15.45.21.4821 | |
| intel | graphics_driver | 15.45.23.4860 | |
| intel | graphics_driver | 24.20.100.6025 | |
| intel | graphics_driver | 24.20.100.6094 | |
| intel | graphics_driver | 24.20.100.6136 | |
| intel | graphics_driver | 24.20.100.6194 | |
| intel | graphics_driver | 24.20.100.6229 | |
| intel | graphics_driver | 24.20.100.6286 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:intel:graphics_driver:15.33.43.4425:*:*:*:*:windows:*:*",
"matchCriteriaId": "46DA06DD-52CA-4FA9-93A1-A52DE84C1644",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:graphics_driver:15.33.45.4653:*:*:*:*:windows:*:*",
"matchCriteriaId": "CBE1FEDC-1727-4C1E-BD5B-2ADF8C6B5DAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:graphics_driver:15.33.46.4885:*:*:*:*:windows:*:*",
"matchCriteriaId": "5EB29EF4-D012-445B-8AD0-329EB417A9A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:graphics_driver:15.36.26.4294:*:*:*:*:windows:*:*",
"matchCriteriaId": "9C6F6A0E-92CE-4ECD-97D4-74625905CD67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:graphics_driver:15.36.28.4332:*:*:*:*:windows:*:*",
"matchCriteriaId": "2681B1E3-325E-4464-818A-25A699C6E0F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:graphics_driver:15.36.31.4414:*:*:*:*:windows:*:*",
"matchCriteriaId": "8256C6E1-9D66-4BB4-A016-28D3C61D32F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:graphics_driver:15.36.33.4578:*:*:*:*:windows:*:*",
"matchCriteriaId": "C6FD7B20-B590-4769-B9E4-F729FE69C458",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:graphics_driver:15.36.34.4889:*:*:*:*:windows:*:*",
"matchCriteriaId": "E14987BE-67FE-47CF-9DAC-403C5E16CFC7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:graphics_driver:15.40.34.4624:*:*:*:*:windows:*:*",
"matchCriteriaId": "80F4313B-7638-433A-B0DF-C371AE56CFFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:graphics_driver:15.40.36.4703:*:*:*:*:windows:*:*",
"matchCriteriaId": "B53F3860-B5BC-47DB-A6C1-CF1C805C8784",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:graphics_driver:15.40.37.4835:*:*:*:*:windows:*:*",
"matchCriteriaId": "4F5F99CA-043F-4EFC-B0C8-13A1208DC7EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:graphics_driver:15.40.38.4963:*:*:*:*:windows:*:*",
"matchCriteriaId": "74217D7F-1EEC-4219-9DC4-57D143D1CE0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:graphics_driver:15.40.41.5058:*:*:*:*:windows:*:*",
"matchCriteriaId": "DE465097-C835-4D95-96A8-0E6C775BD11C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:graphics_driver:15.45.18.4664:*:*:*:*:windows:*:*",
"matchCriteriaId": "7311B7AE-DF12-49BE-8D80-BBCE402C6958",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:graphics_driver:15.45.19.4678:*:*:*:*:windows:*:*",
"matchCriteriaId": "D308A31F-B73F-48D3-8C5A-5320DBBA57C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:graphics_driver:15.45.21.4821:*:*:*:*:windows:*:*",
"matchCriteriaId": "A50439F4-2052-4F65-B5EC-1B94321777A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:graphics_driver:15.45.23.4860:*:*:*:*:windows:*:*",
"matchCriteriaId": "00146320-E0B0-4660-839E-1758AA2BF8B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6025:*:*:*:*:windows:*:*",
"matchCriteriaId": "D3CE3ADC-7FA5-4B85-B032-104AD50E6462",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6094:*:*:*:*:windows:*:*",
"matchCriteriaId": "1021088C-1F07-42E2-B409-1BCCBEBDF522",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6136:*:*:*:*:windows:*:*",
"matchCriteriaId": "5F94F93C-366F-4E78-83B4-F0DBC3572E2C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6194:*:*:*:*:windows:*:*",
"matchCriteriaId": "91F70FDF-1E73-4C90-93C2-4B0356F3F033",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6229:*:*:*:*:windows:*:*",
"matchCriteriaId": "44277329-F2A7-4C93-891B-855F765E466D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:graphics_driver:24.20.100.6286:*:*:*:*:windows:*:*",
"matchCriteriaId": "686EA8C9-F877-40ED-8757-03811E15B0F9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Use after free in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 may allow an unprivileged user to potentially enable a denial of service via local access."
},
{
"lang": "es",
"value": "Uso de memoria previamente liberada en el controlador del modo de kernel en Intel(R) Graphics Driver for Windows* en versiones anteriores a la 10.18.x.5059 (tambi\u00e9n conocido como 15.33.x.5059), 10.18.x.5057 (tambi\u00e9n conocido como 15.36.x.5057), 20.19.x.5063 (tambi\u00e9n conocido como 15.40.x.5063) 21.20.x.5064 (tambi\u00e9n conocido como 15.45.x.5064) y 24.20.100.6373 podr\u00eda permitir que un usuario sin privilegios provoque una denegaci\u00f3n de servicio mediante acceso local."
}
],
"id": "CVE-2018-18091",
"lastModified": "2024-11-21T03:55:28.000",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.0,
"impactScore": 4.0,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-03-14T20:29:01.477",
"references": [
{
"source": "secure@intel.com",
"url": "https://support.lenovo.com/us/en/product_security/LEN-25084"
},
{
"source": "secure@intel.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://support.lenovo.com/us/en/product_security/LEN-25084"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html"
}
],
"sourceIdentifier": "secure@intel.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-416"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GSD-2018-18091
Vulnerability from gsd - Updated: 2023-12-13 01:22{
"GSD": {
"alias": "CVE-2018-18091",
"description": "Use after free in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 may allow an unprivileged user to potentially enable a denial of service via local access.",
"id": "GSD-2018-18091"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2018-18091"
],
"details": "Use after free in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 may allow an unprivileged user to potentially enable a denial of service via local access.",
"id": "GSD-2018-18091",
"modified": "2023-12-13T01:22:36.605635Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"DATE_PUBLIC": "2019-03-12T00:00:00",
"ID": "CVE-2018-18091",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Intel(R) Graphics Driver for Windows",
"version": {
"version_data": [
{
"version_value": "Multiple versions."
}
]
}
}
]
},
"vendor_name": "Intel Corporation"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Use after free in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 may allow an unprivileged user to potentially enable a denial of service via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Denial of Service"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html",
"refsource": "CONFIRM",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html"
},
{
"name": "https://support.lenovo.com/us/en/product_security/LEN-25084",
"refsource": "CONFIRM",
"url": "https://support.lenovo.com/us/en/product_security/LEN-25084"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:intel:graphics_driver:15.33.45.4653:*:*:*:*:windows:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:intel:graphics_driver:15.33.46.4885:*:*:*:*:windows:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:intel:graphics_driver:15.40.36.4703:*:*:*:*:windows:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:intel:graphics_driver:15.40.37.4835:*:*:*:*:windows:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:intel:graphics_driver:24.20.100.6094:*:*:*:*:windows:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:intel:graphics_driver:24.20.100.6136:*:*:*:*:windows:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:intel:graphics_driver:15.36.26.4294:*:*:*:*:windows:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:intel:graphics_driver:15.36.28.4332:*:*:*:*:windows:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:intel:graphics_driver:15.40.38.4963:*:*:*:*:windows:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:intel:graphics_driver:15.40.41.5058:*:*:*:*:windows:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:intel:graphics_driver:24.20.100.6194:*:*:*:*:windows:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:intel:graphics_driver:24.20.100.6229:*:*:*:*:windows:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:intel:graphics_driver:15.33.43.4425:*:*:*:*:windows:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:intel:graphics_driver:15.36.34.4889:*:*:*:*:windows:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:intel:graphics_driver:15.40.34.4624:*:*:*:*:windows:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:intel:graphics_driver:15.45.21.4821:*:*:*:*:windows:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:intel:graphics_driver:15.45.23.4860:*:*:*:*:windows:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:intel:graphics_driver:24.20.100.6025:*:*:*:*:windows:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:intel:graphics_driver:15.36.31.4414:*:*:*:*:windows:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:intel:graphics_driver:15.36.33.4578:*:*:*:*:windows:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:intel:graphics_driver:15.45.18.4664:*:*:*:*:windows:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:intel:graphics_driver:15.45.19.4678:*:*:*:*:windows:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:intel:graphics_driver:24.20.100.6286:*:*:*:*:windows:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2018-18091"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Use after free in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 may allow an unprivileged user to potentially enable a denial of service via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html",
"refsource": "CONFIRM",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html"
},
{
"name": "https://support.lenovo.com/us/en/product_security/LEN-25084",
"refsource": "CONFIRM",
"tags": [],
"url": "https://support.lenovo.com/us/en/product_security/LEN-25084"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.0,
"impactScore": 4.0
}
},
"lastModifiedDate": "2019-04-04T19:29Z",
"publishedDate": "2019-03-14T20:29Z"
}
}
}
GHSA-W88J-QXF2-4F7M
Vulnerability from github – Published: 2022-05-14 01:13 – Updated: 2022-05-14 01:13Use after free in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 may allow an unprivileged user to potentially enable a denial of service via local access.
{
"affected": [],
"aliases": [
"CVE-2018-18091"
],
"database_specific": {
"cwe_ids": [
"CWE-416"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2019-03-14T20:29:00Z",
"severity": "MODERATE"
},
"details": "Use after free in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 may allow an unprivileged user to potentially enable a denial of service via local access.",
"id": "GHSA-w88j-qxf2-4f7m",
"modified": "2022-05-14T01:13:07Z",
"published": "2022-05-14T01:13:07Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-18091"
},
{
"type": "WEB",
"url": "https://support.lenovo.com/us/en/product_security/LEN-25084"
},
{
"type": "WEB",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00189.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.