CVE-2017-5706

Multiple buffer overflows in kernel in Intel Server Platform Services Firmware 4.0 allow attacker with local access to the system to execute arbitrary code.
References
Link Resource
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html Issue Tracking Patch Third Party Advisory
http://www.securityfocus.com/bid/101906 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1039955 Third Party Advisory VDB Entry
https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-fr Issue Tracking Vendor Advisory
https://security.netapp.com/advisory/ntap-20171120-0001/ Issue Tracking Third Party Advisory Tool Signature
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03798en_us
https://twitter.com/PTsecurity_UK/status/938447926128291842
https://www.asus.com/News/wzeltG5CjYaIwGJ0
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html Issue Tracking Patch Third Party Advisory
http://www.securityfocus.com/bid/101906 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1039955 Third Party Advisory VDB Entry
https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-fr Issue Tracking Vendor Advisory
https://security.netapp.com/advisory/ntap-20171120-0001/ Issue Tracking Third Party Advisory Tool Signature
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03798en_us
https://twitter.com/PTsecurity_UK/status/938447926128291842
https://www.asus.com/News/wzeltG5CjYaIwGJ0
Configurations

Configuration 1 (hide)

cpe:2.3:o:intel:server_platform_services_firmware:4.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:28

Type Values Removed Values Added
References () http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html - Issue Tracking, Patch, Third Party Advisory () http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html - Issue Tracking, Patch, Third Party Advisory
References () http://www.securityfocus.com/bid/101906 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/101906 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1039955 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1039955 - Third Party Advisory, VDB Entry
References () https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf - () https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf -
References () https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-fr - Issue Tracking, Vendor Advisory () https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-fr - Issue Tracking, Vendor Advisory
References () https://security.netapp.com/advisory/ntap-20171120-0001/ - Issue Tracking, Third Party Advisory, Tool Signature () https://security.netapp.com/advisory/ntap-20171120-0001/ - Issue Tracking, Third Party Advisory, Tool Signature
References () https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03798en_us - () https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03798en_us -
References () https://twitter.com/PTsecurity_UK/status/938447926128291842 - () https://twitter.com/PTsecurity_UK/status/938447926128291842 -
References () https://www.asus.com/News/wzeltG5CjYaIwGJ0 - () https://www.asus.com/News/wzeltG5CjYaIwGJ0 -

Information

Published : 2017-11-21 14:29

Updated : 2024-11-21 03:28


NVD link : CVE-2017-5706

Mitre link : CVE-2017-5706

CVE.ORG link : CVE-2017-5706


JSON object : View

Products Affected

intel

  • server_platform_services_firmware
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer