Buffer overflow in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.47 may allow a privileged user to potentially enable escalation of privilege via local access.
References
Link | Resource |
---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00434.html | Patch Vendor Advisory |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00434.html | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 04:59
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00434.html - Patch, Vendor Advisory |
Information
Published : 2021-02-19 16:15
Updated : 2024-11-21 04:59
NVD link : CVE-2020-12374
Mitre link : CVE-2020-12374
CVE.ORG link : CVE-2020-12374
JSON object : View
Products Affected
intel
- r2208wfqzsr
- r2312wf0npr
- hns2600bpbr
- hns2600bpblc24
- hns2600bps
- r2224wftzs
- s2600stq
- r1208wftys
- r2312wftzs
- bmc_firmware
- r2208wfqzs
- hns2600bpq24r
- hns2600bpblc
- hns2600bpqr
- r2208wf0zsr
- hns2600bpblc24r
- r1000wf
- s2600wft
- r2208wftzs
- s2600bpqr
- r1304wftys
- hns2600bpb
- hns2600bpq
- r1304wftysr
- hns2600bpq24
- r2208wf0zs
- r2308wftzs
- r2208wftzsr
- hns2600bps24r
- r2312wftzsr
- hns2600bps24
- s2600bpbr
- r2312wfqzs
- r2312wf0np
- s2600wf0
- s2600bpsr
- hns2600bpsr
- r1208wftysr
- r1304wf0ys
- hns2600bpb24
- s2600wfq
- s2600stb
- r1304wf0ysr
- hns2600bpb24r
- r2308wftzsr
- r1208wfqysr
- r2224wfqzs
- r2224wftzsr
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')