SEMA driver in Intel Driver and Support Assistant before version 3.1.1 allows a local attacker the ability to read and writing to Memory Status registers potentially allowing information disclosure or a denial of service condition.
References
Link | Resource |
---|---|
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00108&languageid=en-fr | Vendor Advisory |
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00108&languageid=en-fr | Vendor Advisory |
Configurations
History
21 Nov 2024, 04:05
Type | Values Removed | Values Added |
---|---|---|
References | () https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00108&languageid=en-fr - Vendor Advisory |
Information
Published : 2018-01-09 21:29
Updated : 2024-11-21 04:05
NVD link : CVE-2018-3610
Mitre link : CVE-2018-3610
CVE.ORG link : CVE-2018-3610
JSON object : View
Products Affected
intel
- driver_\&_support_assistant
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer