ID

VAR-201209-0592


CVE

CVE-2011-5174


TITLE

plural Intel Product buffer overflow vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2011-005160

DESCRIPTION

Buffer overflow in Intel Trusted Execution Technology (TXT) SINIT Authenticated Code Modules (ACM) in Intel Q67 Express, C202, C204, C206 Chipsets, and Mobile Intel QM67, and QS67 Chipset before 2nd_gen_i5_i7_SINIT_51.BIN Express; Intel Q57, 3450 Chipsets and Mobile Intel QM57 and QS57 Express Chipset before i5_i7_DUAL_SINIT_51.BIN and i7_QUAD_SINIT_51.BIN; Mobile Intel GM45, GS45, and PM45 Express Chipset before GM45_GS45_PM45_SINIT_51.BIN; Intel Q35 Express Chipsets before Q35_SINIT_51.BIN; and Intel 5520, 5500, X58, and 7500 Chipsets before SINIT ACM 1.1 allows local users to bypass the Trusted Execution Technology protection mechanism and perform other unspecified SINIT ACM functions via unspecified vectors. Mobile Intel Qm67 Chipset is prone to a local security vulnerability. Intel Trusted Execution Technology (TXT, Intel Trusted Execution Technology) is a hardware extension technology in the Intel Core 2 Duo processor, mainly used to protect data in a virtualized computing environment from spyware Attacks, virus intrusion and other threats. ---------------------------------------------------------------------- Secunia is hiring! Find your next job here: http://secunia.com/company/jobs/ ---------------------------------------------------------------------- TITLE: Intel Trusted Execution Technology SINIT ACMs Buffer Overflow Vulnerability SECUNIA ADVISORY ID: SA47096 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/47096/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=47096 RELEASE DATE: 2011-12-06 DISCUSS ADVISORY: http://secunia.com/advisories/47096/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/47096/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=47096 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A vulnerability has been reported in multiple Intel products, which can be exploited my malicious, local users to gain escalated privileges. The vulnerability is caused due to an unspecified error within the Authenticated Code Modules (ACMs) and can be exploited to cause a buffer overflow. Please see the vendor's advisory for the list of affected products. SOLUTION: Install updated SINIT ACMs. Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ PROVIDED AND/OR DISCOVERED BY: The vendor credits Rafal Wojtczuk and Joanna Rutkowska, Invisible Things Lab. ORIGINAL ADVISORY: Intel (INTEL-SA-00030): http://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00030&languageid=en-fr OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2011-5174 // JVNDB: JVNDB-2011-005160 // BID: 77846 // VULHUB: VHN-53119 // PACKETSTORM: 107592

AFFECTED PRODUCTS

vendor:intelmodel:q67 express chipsetscope:eqversion: -

Trust: 1.3

vendor:intelmodel:q57 chipsetscope:eqversion: -

Trust: 1.3

vendor:intelmodel:q35 express chipsetscope:eqversion: -

Trust: 1.3

vendor:intelmodel:mobile intel qs57 express chipsetscope:eqversion: -

Trust: 1.3

vendor:intelmodel:mobile intel qs57 chipsetscope:eqversion: -

Trust: 1.3

vendor:intelmodel:mobile intel qm67 chipsetscope:eqversion: -

Trust: 1.3

vendor:intelmodel:mobile intel qm57 chipsetscope:eqversion: -

Trust: 1.3

vendor:intelmodel:mobile intel pm45 express chipsetscope:eqversion: -

Trust: 1.3

vendor:intelmodel:mobile intel gs45 chipsetscope:eqversion: -

Trust: 1.3

vendor:intelmodel:mobile intel gm45 chipsetscope:eqversion: -

Trust: 1.3

vendor:intelmodel:c206 chipsetscope:eqversion: -

Trust: 1.3

vendor:intelmodel:c204 chipsetscope:eqversion: -

Trust: 1.3

vendor:intelmodel:c202 chipsetscope:eqversion: -

Trust: 1.3

vendor:intelmodel:3450 chipsetscope:eqversion: -

Trust: 1.0

vendor:intelmodel:5500 chipsetscope:eqversion: -

Trust: 1.0

vendor:intelmodel:5520 chipsetscope:eqversion: -

Trust: 1.0

vendor:intelmodel:sinit authenticated code modulescope:lteversion:2nd_gen_i5_i7_sinit_1.9.bin

Trust: 1.0

vendor:intelmodel:sinit authenticated code modulescope:lteversion:gm45_gs45_pm45_sinit_21.bin

Trust: 1.0

vendor:intelmodel:sinit authenticated code modulescope:lteversion:i7_quad_sinit_20.bin

Trust: 1.0

vendor:intelmodel:7500 chipsetscope:eqversion: -

Trust: 1.0

vendor:intelmodel:sinit authenticated code modulescope:lteversion:i5_i7_dual_sinit_18.bin

Trust: 1.0

vendor:intelmodel:x58 chipsetscope:eqversion: -

Trust: 1.0

vendor:intelmodel:mobile intel qs67 chipsetscope:eqversion:_express-

Trust: 1.0

vendor:intelmodel:sinit authenticated code modulescope:lteversion:1.0

Trust: 1.0

vendor:intelmodel:sinit authenticated code modulescope:lteversion:q35_sinit_18.bin

Trust: 1.0

vendor:intelmodel:sinit authenticated code modulescope:eqversion:1.0

Trust: 0.9

vendor:intelmodel:sinit acmscope:ltversion:1.1 (*6)

Trust: 0.8

vendor:intelmodel:sinit acmscope:ltversion:2nd_gen_i5_i7_sinit_51.bin (*1)

Trust: 0.8

vendor:intelmodel:sinit acmscope:ltversion:gm45_gs45_pm45_sinit_51.bin (*4)

Trust: 0.8

vendor:intelmodel:sinit acmscope:ltversion:i5_i7_dual_sinit_51.bin (*2)

Trust: 0.8

vendor:intelmodel:sinit acmscope:ltversion:i7_quad_sinit_51.bin (*3)

Trust: 0.8

vendor:intelmodel:sinit acmscope:ltversion:q35_sinit_51.bin (*5)

Trust: 0.8

vendor:intelmodel:3450 chip setscope: - version: -

Trust: 0.8

vendor:intelmodel:5500 chip setscope: - version: -

Trust: 0.8

vendor:intelmodel:5520 chip setscope: - version: -

Trust: 0.8

vendor:intelmodel:7500 chip setscope: - version: -

Trust: 0.8

vendor:intelmodel:c202 chip setscope: - version: -

Trust: 0.8

vendor:intelmodel:c204 chip setscope: - version: -

Trust: 0.8

vendor:intelmodel:c206 chip setscope: - version: -

Trust: 0.8

vendor:intelmodel:q35 express chip setscope: - version: -

Trust: 0.8

vendor:intelmodel:q57 chip setscope: - version: -

Trust: 0.8

vendor:intelmodel:q67 express chip setscope: - version: -

Trust: 0.8

vendor:intelmodel:x58 chip setscope: - version: -

Trust: 0.8

vendor:intelmodel:mobile intel gm45 chip setscope: - version: -

Trust: 0.8

vendor:intelmodel:mobile intel gs45 chip setscope: - version: -

Trust: 0.8

vendor:intelmodel:mobile intel pm45 express chip setscope: - version: -

Trust: 0.8

vendor:intelmodel:mobile intel qm57 chip setscope: - version: -

Trust: 0.8

vendor:intelmodel:mobile intel qm67 chip setscope: - version: -

Trust: 0.8

vendor:intelmodel:mobile intel qs57 express chip setscope: - version: -

Trust: 0.8

vendor:intelmodel:mobile intel qs57 chip setscope: - version: -

Trust: 0.8

vendor:intelmodel:mobile intel qs67 express chip setscope: - version: -

Trust: 0.8

vendor:intelmodel:sinit authenticated code modulescope:eqversion:gm45_gs45_pm45_sinit_21.bin

Trust: 0.6

vendor:intelmodel:sinit authenticated code modulescope:eqversion:i7_quad_sinit_20.bin

Trust: 0.6

vendor:intelmodel:sinit authenticated code modulescope:eqversion:2nd_gen_i5_i7_sinit_1.9.bin

Trust: 0.6

vendor:intelmodel:sinit authenticated code modulescope:eqversion:i5_i7_dual_sinit_18.bin

Trust: 0.6

vendor:intelmodel:sinit authenticated code modulescope:eqversion:q35_sinit_18.bin

Trust: 0.6

vendor:intelmodel:chipsetscope:eqversion:x58-

Trust: 0.3

vendor:intelmodel:sinit authenticated code module q35 sinit 18.binscope: - version: -

Trust: 0.3

vendor:intelmodel:sinit authenticated code module i7 quad sinit 20.binscope: - version: -

Trust: 0.3

vendor:intelmodel:sinit authenticated code module i5 i7 dual sinitscope:eqversion:18.

Trust: 0.3

vendor:intelmodel:sinit authenticated code module gm45 gs45 pm45 sinitscope: - version: -

Trust: 0.3

vendor:intelmodel:sinit authenticated code module 2nd gen i5 i7 sinitscope: - version: -

Trust: 0.3

vendor:intelmodel:mobile intel qs67 chipset express-scope: - version: -

Trust: 0.3

vendor:intelmodel:chipsetscope:eqversion:7500-

Trust: 0.3

vendor:intelmodel:chipsetscope:eqversion:5520-

Trust: 0.3

vendor:intelmodel:chipsetscope:eqversion:5500-

Trust: 0.3

vendor:intelmodel:chipsetscope:eqversion:3450-

Trust: 0.3

sources: BID: 77846 // JVNDB: JVNDB-2011-005160 // CNNVD: CNNVD-201209-338 // NVD: CVE-2011-5174

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-5174
value: HIGH

Trust: 1.0

NVD: CVE-2011-5174
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201209-338
value: HIGH

Trust: 0.6

VULHUB: VHN-53119
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2011-5174
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-53119
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-53119 // JVNDB: JVNDB-2011-005160 // CNNVD: CNNVD-201209-338 // NVD: CVE-2011-5174

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-53119 // JVNDB: JVNDB-2011-005160 // NVD: CVE-2011-5174

THREAT TYPE

local

Trust: 1.0

sources: BID: 77846 // PACKETSTORM: 107592 // CNNVD: CNNVD-201209-338

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201209-338

CONFIGURATIONS

sources: JVNDB: JVNDB-2011-005160

PATCH

title:INTEL-SA-00030url:http://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00030&languageid=en-fr

Trust: 0.8

sources: JVNDB: JVNDB-2011-005160

EXTERNAL IDS

db:NVDid:CVE-2011-5174

Trust: 2.8

db:SECUNIAid:47096

Trust: 1.8

db:OSVDBid:77554

Trust: 1.7

db:XFid:71625

Trust: 0.9

db:JVNDBid:JVNDB-2011-005160

Trust: 0.8

db:CNNVDid:CNNVD-201209-338

Trust: 0.7

db:BIDid:77846

Trust: 0.4

db:VULHUBid:VHN-53119

Trust: 0.1

db:PACKETSTORMid:107592

Trust: 0.1

sources: VULHUB: VHN-53119 // BID: 77846 // JVNDB: JVNDB-2011-005160 // PACKETSTORM: 107592 // CNNVD: CNNVD-201209-338 // NVD: CVE-2011-5174

REFERENCES

url:http://security-center.intel.com/advisory.aspx?intelid=intel-sa-00030&languageid=en-fr

Trust: 2.0

url:http://osvdb.org/77554

Trust: 1.7

url:http://secunia.com/advisories/47096

Trust: 1.7

url:http://theinvisiblethings.blogspot.com/2011/12/exploring-new-lands-on-intel-cpus-sinit.html

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/71625

Trust: 1.1

url:http://xforce.iss.net/xforce/xfdb/71625

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-5174

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-5174

Trust: 0.8

url:http://security-center.intel.com/advisory.aspx?intelid=intel-sa-00030&languageid=en-fr

Trust: 0.1

url:http://secunia.com/advisories/47096/

Trust: 0.1

url:http://secunia.com/company/jobs/

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/47096/#comments

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=47096

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-53119 // BID: 77846 // JVNDB: JVNDB-2011-005160 // PACKETSTORM: 107592 // CNNVD: CNNVD-201209-338 // NVD: CVE-2011-5174

CREDITS

Unknown

Trust: 0.3

sources: BID: 77846

SOURCES

db:VULHUBid:VHN-53119
db:BIDid:77846
db:JVNDBid:JVNDB-2011-005160
db:PACKETSTORMid:107592
db:CNNVDid:CNNVD-201209-338
db:NVDid:CVE-2011-5174

LAST UPDATE DATE

2025-04-11T23:16:39.972000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-53119date:2017-11-10T00:00:00
db:BIDid:77846date:2012-09-15T00:00:00
db:JVNDBid:JVNDB-2011-005160date:2012-09-19T00:00:00
db:CNNVDid:CNNVD-201209-338date:2012-09-19T00:00:00
db:NVDid:CVE-2011-5174date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:VULHUBid:VHN-53119date:2012-09-15T00:00:00
db:BIDid:77846date:2012-09-15T00:00:00
db:JVNDBid:JVNDB-2011-005160date:2012-09-19T00:00:00
db:PACKETSTORMid:107592date:2011-12-07T07:41:43
db:CNNVDid:CNNVD-201209-338date:2012-09-19T00:00:00
db:NVDid:CVE-2011-5174date:2012-09-15T17:55:05.707