intel nuc_m15_laptop_kit_lapbc510_firmware 跨界内存写

admin 2023-11-30 05:55:43 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
intel nuc_m15_laptop_kit_lapbc510_firmware 跨界内存写

CVE编号

CVE-2022-2154

利用情况

暂无

补丁情况

N/A

披露时间

2022-09-21
漏洞描述
An attacker with physical access can exploit this vulnerability to execute arbitrary code during DXE phase. A malicious code installed as a result of vulnerability exploitation in DXE driver could survive across an operating system (OS) boot process and runtime This issue affects: Module name: AMITSE SHA256: 288769fcb374d9280735e259c579e2dc209491f4da43b085d6aabc2d6e6ee57d Module GUID: b1da0adf-4f77-4070-a88e-bffe1c60529a This issue affects: AMI Aptio 5.x.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
系统 alibaba_cloud_linux_2.1903 java-11-openjdk-demo * Up to (excluding) 1.8.0.342.b07-1.1.al7
运行在以下环境
系统 amazon_2 java-11-openjdk * Up to (excluding) 1.8.0-amazon-corretto-1.8.0_342.b07-1.amzn2
运行在以下环境
系统 amazon_2022 java-11-amazon-corretto * Up to (excluding) 1.8.0-amazon-corretto-1.8.0_352.b08-1.amzn2022
运行在以下环境
系统 amazon_AMI java-1.7.0-openjdk * Up to (excluding) 1.8.0-openjdk-devel-1.8.0.342.b07-0.68.amzn1
运行在以下环境
系统 ami aptio_v 5.0 -
运行在以下环境
系统 anolis_os_7 java-11-openjdk-demo-debug * Up to (excluding) 1.8.0.342
运行在以下环境
系统 anolis_os_8 mysql * Up to (excluding) 17.0.4.0.8-2
运行在以下环境
系统 centos_7 java-11-openjdk * Up to (excluding) 1.8.0.342.b07-1.el7_9
运行在以下环境
系统 centos_8 java-17-openjdk-demo * Up to (excluding) 1.8.0.342.b07-2.el8_6
运行在以下环境
系统 fedora_35 java-17-openjdk-debugsource * Up to (excluding) 1.8.0.342.b07-1.fc35
运行在以下环境
系统 fedora_36 java-17-openjdk-fastdebug-debuginfo * Up to (excluding) 1.8.0.342.b07-1.fc36
运行在以下环境
系统 intel nuc_m15_laptop_kit_lapbc510_firmware 0072 -
运行在以下环境
系统 intel nuc_m15_laptop_kit_lapbc710_firmware 0072 -
运行在以下环境
系统 kylinos_aarch64_V10 java-11-openjdk * Up to (excluding) 11.0.18.0.10-2.el8_7
运行在以下环境
系统 kylinos_aarch64_V10SP1 java-11-openjdk * Up to (excluding) 11.0.17.8-1.ky10
运行在以下环境
系统 kylinos_aarch64_V10SP2 java-11-openjdk * Up to (excluding) 11.0.17.8-1.ky10
运行在以下环境
系统 kylinos_aarch64_V10SP3 java-11-openjdk * Up to (excluding) 11.0.17.8-1.ky10
运行在以下环境
系统 kylinos_x86_64_V10 java-11-openjdk * Up to (excluding) 11.0.18.0.10-2.el8_7
运行在以下环境
系统 kylinos_x86_64_V10SP1 java-11-openjdk * Up to (excluding) 11.0.17.8-1.ky10
运行在以下环境
系统 kylinos_x86_64_V10SP2 java-11-openjdk * Up to (excluding) 11.0.17.8-1.ky10
运行在以下环境
系统 kylinos_x86_64_V10SP3 java-11-openjdk * Up to (excluding) 11.0.17.8-1.ky10
运行在以下环境
系统 opensuse_Leap_15.3 java-1_8_0-ibm-plugin * Up to (excluding) 11.0.16.0-150000.3.83.1
运行在以下环境
系统 opensuse_Leap_15.4 java-1_8_0-ibm-plugin * Up to (excluding) 11.0.16.0-150000.3.83.1
运行在以下环境
系统 oracle_6 kernel * Up to (excluding) 4.1.12-124.66.3.el6uek
运行在以下环境
系统 oracle_7 oraclelinux-release * Up to (excluding) 1.8.0.342.b07-1.el7_9
运行在以下环境
系统 oracle_8 kernel * Up to (excluding) 11.0.16.0.8-1.el8_6
运行在以下环境
系统 oracle_9 oraclelinux-release * Up to (excluding) 11.0.16.0.8-1.0.1.el9_0
运行在以下环境
系统 redhat_7 java-1.8.0-openjdk * Up to (excluding) 1.8.0-openjdk-javadoc-zip-1.8.0.342.b07-1.el7_9
运行在以下环境
系统 redhat_8 java-11-openjdk-src * Up to (excluding) 1.8.0.342.b07-2.el8_6
运行在以下环境
系统 redhat_9 java * Up to (excluding) 8.0.30-3.el9_0
运行在以下环境
系统 suse_12_SP5 java-1_8_0-ibm-alsa * Up to (excluding) 1.7.1_sr5.15-38.74.1
运行在以下环境
硬件 intel nuc_m15_laptop_kit_lapbc510 - -
运行在以下环境
硬件 intel nuc_m15_laptop_kit_lapbc710 - -
CVSS3评分 7.2
  • 攻击路径 物理
  • 攻击复杂度 低
  • 权限要求 高
  • 影响范围 已更改
  • 用户交互 无
  • 可用性 高
  • 保密性 高
  • 完整性 高
CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
CWE-ID 漏洞类型
CWE-787 跨界内存写
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2024-9120利用情况 暂无补丁情况 N/A披露时间 2024-09-23漏洞描述Use after free in Dawn
评论:0   参与:  0