CVE-2016-1493

Intel Driver Update Utility before 2.4 retrieves driver updates in cleartext, which makes it easier for man-in-the-middle attackers to execute arbitrary code via a crafted file.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:intel:driver_update_utility:2.0:*:*:*:*:*:*:*
cpe:2.3:a:intel:driver_update_utility:2.1:*:*:*:*:*:*:*
cpe:2.3:a:intel:driver_update_utility:2.2:*:*:*:*:*:*:*
cpe:2.3:a:intel:driver_update_utility:2.3:*:*:*:*:*:*:*

History

21 Nov 2024, 02:46

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/135314/Intel-Driver-Update-Utility-2.2.0.5-Man-In-The-Middle.html - () http://packetstormsecurity.com/files/135314/Intel-Driver-Update-Utility-2.2.0.5-Man-In-The-Middle.html -
References () http://seclists.org/fulldisclosure/2016/Jan/56 - () http://seclists.org/fulldisclosure/2016/Jan/56 -
References () http://www.coresecurity.com/advisories/intel-driver-update-utility-mitm - () http://www.coresecurity.com/advisories/intel-driver-update-utility-mitm -
References () http://www.securityfocus.com/archive/1/537327/100/0/threaded - () http://www.securityfocus.com/archive/1/537327/100/0/threaded -
References () https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00048&languageid=en-fr - Patch, Vendor Advisory () https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00048&languageid=en-fr - Patch, Vendor Advisory

Information

Published : 2016-01-29 20:59

Updated : 2024-11-21 02:46


NVD link : CVE-2016-1493

Mitre link : CVE-2016-1493

CVE.ORG link : CVE-2016-1493


JSON object : View

Products Affected

intel

  • driver_update_utility
CWE
CWE-345

Insufficient Verification of Data Authenticity