| Title | 複数の Intel 製品の Intel PSET Application Install ラッパーにおける昇格された権限でプロセスを起動される脆弱性 |
|---|---|
| Summary | 複数の Intel 製品の Intel PSET Application Install ラッパーには、昇格された権限でプロセスを起動される脆弱性が存在します。 |
| Possible impacts | 攻撃者により、昇格された権限でプロセスを起動される可能性があります。 |
| Solution | ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date | Feb. 28, 2017, midnight |
| Registration Date | April 10, 2017, 11:27 a.m. |
| Last Update | April 10, 2017, 11:27 a.m. |
| CVSS3.0 : 重要 | |
| Score | 7.3 |
|---|---|
| Vector | CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H |
| CVSS2.0 : 危険 | |
| Score | 9.3 |
|---|---|
| Vector | AV:N/AC:M/Au:N/C:C/I:C/A:C |
| インテル |
| Cryptography for Intel Integrated Performance Primitives 2017 Update 2 未満 |
| Intel Advisor 2017 Update 2 未満 |
| Intel Data Analytics Acceleration Library 2017 Update 2 未満 |
| Intel Inspector 2017 Update 2 未満 |
| Intel Integrated Performance Primitives 2017 Update 2 未満 |
| Intel Math Kernel Library 2017 Update 2 未満 |
| Intel MPI Library 2017 Update 2 未満 |
| Intel Parallel Studio XE 2017 Update 2 未満 |
| Intel System Studio 2017 Update 2 未満 |
| Intel Threading Building Blocks 2017 Update 2 未満 |
| Intel Trace Analyzer and Collector 2017 Update 2 未満 |
| Intel VTune Amplifier 2017 Update 2 未満 |
| No | Changed Details | Date of change |
|---|---|---|
| 0 | [2017年04月10日] 掲載 |
Feb. 17, 2018, 10:37 a.m. |
| Summary | Intel PSET Application Install wrapper of Intel Parallel Studio XE, Intel System Studio, Intel VTune Amplifier, Intel Inspector, Intel Advisor, Intel MPI Library, Intel Trace Analyzer and Collector, Intel Integrated Performance Primitives, Cryptography for Intel Integrated Performance Primitives, Intel Math Kernel Library, Intel Data Analytics Acceleration Library, and Intel Threading Building Blocks before 2017 Update 2 allows an attacker to launch a process with escalated privileges. |
|---|---|
| Publication Date | March 1, 2017, 4:59 a.m. |
| Registration Date | Jan. 26, 2021, 1:26 p.m. |
| Last Update | Nov. 21, 2024, 12:28 p.m. |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:a:intel:system_studio:2017:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:intel:parallel_studio_xe:2017:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:intel:data_analytics_acceleration_library:2017:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:intel:integrated_performance_primitives:2017:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:intel:vtune_amplifier:2017:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:intel:math_kernel_library:2017:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:intel:trace_analyzer_and_collector:2017:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:intel:advisor:2017:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:intel:cryptography_for_intel_integrated_performance_primitives:2017:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:intel:threading_building_blocks:2017:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:intel:mpi_library:2017:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:intel:inspector:2017:*:*:*:*:*:*:* | |||||