ID

VAR-202302-1203


CVE

CVE-2022-34346


TITLE

Intel's  media software development kit  Out-of-bounds read vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2022-019740

DESCRIPTION

Out-of-bounds read in the Intel(R) Media SDK software before version 22.2.2 may allow an authenticated user to potentially enable escalation of privilege via local access. Intel's media software development kit Exists in an out-of-bounds read vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state

Trust: 1.8

sources: NVD: CVE-2022-34346 // JVNDB: JVNDB-2022-019740 // VULHUB: VHN-431077 // VULMON: CVE-2022-34346

AFFECTED PRODUCTS

vendor:intelmodel:media software development kitscope:ltversion:22.2.2

Trust: 1.0

vendor:インテルmodel:media software development kitscope: - version: -

Trust: 0.8

vendor:インテルmodel:media software development kitscope:eqversion:22.2.2

Trust: 0.8

vendor:インテルmodel:media software development kitscope:eqversion: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-019740 // NVD: CVE-2022-34346

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-34346
value: HIGH

Trust: 1.0

secure@intel.com: CVE-2022-34346
value: MEDIUM

Trust: 1.0

NVD: CVE-2022-34346
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202302-1323
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2022-34346
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

secure@intel.com: CVE-2022-34346
baseSeverity: MEDIUM
baseScore: 4.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: LOW
exploitabilityScore: 1.3
impactScore: 3.4
version: 3.1

Trust: 1.0

NVD: CVE-2022-34346
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2022-019740 // CNNVD: CNNVD-202302-1323 // NVD: CVE-2022-34346 // NVD: CVE-2022-34346

PROBLEMTYPE DATA

problemtype:CWE-125

Trust: 1.1

problemtype:Out-of-bounds read (CWE-125) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-431077 // JVNDB: JVNDB-2022-019740 // NVD: CVE-2022-34346

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202302-1323

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-202302-1323

PATCH

title:Intel Media SDK Buffer error vulnerability fixurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=226953

Trust: 0.6

title: - url:https://github.com/Live-Hack-CVE/CVE-2022-34346

Trust: 0.1

sources: VULMON: CVE-2022-34346 // CNNVD: CNNVD-202302-1323

EXTERNAL IDS

db:NVDid:CVE-2022-34346

Trust: 3.4

db:JVNid:JVNVU91223897

Trust: 0.8

db:JVNDBid:JVNDB-2022-019740

Trust: 0.8

db:AUSCERTid:ESB-2023.0905

Trust: 0.6

db:CNNVDid:CNNVD-202302-1323

Trust: 0.6

db:VULHUBid:VHN-431077

Trust: 0.1

db:VULMONid:CVE-2022-34346

Trust: 0.1

sources: VULHUB: VHN-431077 // VULMON: CVE-2022-34346 // JVNDB: JVNDB-2022-019740 // CNNVD: CNNVD-202302-1323 // NVD: CVE-2022-34346

REFERENCES

url:http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00731.html

Trust: 2.6

url:https://jvn.jp/vu/jvnvu91223897/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2022-34346

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2022-34346/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.0905

Trust: 0.6

url:https://github.com/live-hack-cve/cve-2022-34346

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-431077 // VULMON: CVE-2022-34346 // JVNDB: JVNDB-2022-019740 // CNNVD: CNNVD-202302-1323 // NVD: CVE-2022-34346

SOURCES

db:VULHUBid:VHN-431077
db:VULMONid:CVE-2022-34346
db:JVNDBid:JVNDB-2022-019740
db:CNNVDid:CNNVD-202302-1323
db:NVDid:CVE-2022-34346

LAST UPDATE DATE

2024-08-14T13:02:58.652000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-431077date:2023-02-27T00:00:00
db:VULMONid:CVE-2022-34346date:2023-02-17T00:00:00
db:JVNDBid:JVNDB-2022-019740date:2023-10-27T05:35:00
db:CNNVDid:CNNVD-202302-1323date:2023-02-28T00:00:00
db:NVDid:CVE-2022-34346date:2023-02-27T19:08:13.277

SOURCES RELEASE DATE

db:VULHUBid:VHN-431077date:2023-02-16T00:00:00
db:VULMONid:CVE-2022-34346date:2023-02-16T00:00:00
db:JVNDBid:JVNDB-2022-019740date:2023-10-27T00:00:00
db:CNNVDid:CNNVD-202302-1323date:2023-02-16T00:00:00
db:NVDid:CVE-2022-34346date:2023-02-16T21:15:12.697