Lucene search

K
openvasCopyright (C) 2010 Greenbone Networks GmbHOPENVAS:1361412562310800164
HistoryFeb 11, 2010 - 12:00 a.m.

Intel Desktop Boards SMM Local Privilege Escalation Vulnerability (INTEL-SA-00022) - Linux

2010-02-1100:00:00
Copyright (C) 2010 Greenbone Networks GmbH
plugins.openvas.org
8

4.6 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

6.5 Medium

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

37.2%

Intel Desktop Boards are prone to a local privilege escalation
vulnerability.

# Copyright (C) 2010 Greenbone Networks GmbH
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-or-later
#
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License
# as published by the Free Software Foundation; either version 2
# of the License, or (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.800164");
  script_version("2022-09-20T10:11:40+0000");
  script_tag(name:"last_modification", value:"2022-09-20 10:11:40 +0000 (Tue, 20 Sep 2022)");
  script_tag(name:"creation_date", value:"2010-02-11 16:37:59 +0100 (Thu, 11 Feb 2010)");
  script_tag(name:"cvss_base", value:"4.6");
  script_tag(name:"cvss_base_vector", value:"AV:L/AC:L/Au:N/C:P/I:P/A:P");
  script_cve_id("CVE-2010-0560");
  script_name("Intel Desktop Boards SMM Local Privilege Escalation Vulnerability (INTEL-SA-00022) - Linux");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2010 Greenbone Networks GmbH");
  script_family("Privilege escalation");
  script_dependencies("gb_desktop_board_bios_info_ssh_login_detect.nasl");
  script_mandatory_keys("DesktopBoards/BIOS/Ver", "DesktopBoards/BIOS/Vendor", "DesktopBoards/BaseBoard/ProdName");
  script_require_keys("DesktopBoards/BaseBoard/Manufacturer");

  script_tag(name:"summary", value:"Intel Desktop Boards are prone to a local privilege escalation
  vulnerability.");

  script_tag(name:"impact", value:"Successful exploitation lets local users to bypass certain
  security restrictions and gain elevated privileges.");

  script_tag(name:"affected", value:"Intel Desktop Board DB, DG, DH, DP, and DQ Series.");

  script_tag(name:"insight", value:"An unspecified error exists in System Management Mode (SMM)
  implementation in Intel Desktop Boards, which could allow software running administrative (ring 0)
  privilege to change code running in SMM.");

  script_tag(name:"solution", value:"Update the BIOS. Please see the referenced vendor advisory for
  an overview on the available updates.");

  script_tag(name:"qod_type", value:"executable_version");
  script_tag(name:"solution_type", value:"VendorFix");

  script_xref(name:"URL", value:"http://secunia.com/advisories/38413");
  script_xref(name:"URL", value:"http://www.vupen.com/english/advisories/2010/0271");
  script_xref(name:"URL", value:"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00022.html");

  exit(0);
}

include("version_func.inc");

bios_ver = get_kb_item("DesktopBoards/BIOS/Ver");
bios_vendor = get_kb_item("DesktopBoards/BIOS/Vendor");
base_board_manu = get_kb_item("DesktopBoards/BaseBoard/Manufacturer");
base_board_prod_name = get_kb_item("DesktopBoards/BaseBoard/ProdName");
if(!bios_ver || !bios_vendor || !base_board_prod_name)
  exit(0);

if(!egrep(pattern:"Intel", string:bios_vendor) || !egrep(pattern:"Intel", string:base_board_manu))
  exit(0);

## All affected products
aff_prods = ["DQ43AP", "DQ45CB", "DQ45EK", "DQ35JO", "DQ35MP", "DP55KG",
             "DP55SB", "DP55WG", "DP55WB", "DQ57TM", "DH55TC", "DH55HC",
             "DG41KR", "DB43LD", "DG41MJ", "DG41RQ", "DG41TY"];

## All fixed product versions, kept in order as affected products
fix_prod_ver = ["APQ4310H.86A.0031", "CBQ4510H.86A.0109", "CBQ4510H.86A.0109",
                "JOQ3510J.86A.1126", "JOQ3510J.86A.1126", "KGIBX10J.86A.4236",
                "KGIBX10J.86A.4236", "KGIBX10J.86A.4236", "WBIBX10J.86A.0181",
                "TMIBX10H.86A.0025", "TCIBX10H.86A.0028", "TCIBX10H.86A.0028",
                "KRG4110H.86A.0029", "LDB4310H.86A.0035", "MJG4110H.86A.0006",
                "RQG4110H.86A.0013", "TYG4110H.86A.0037"];

aff_prods_len = max_index(aff_prods);
for(i=0; i < aff_prods_len; i++) {

  if(base_board_prod_name == aff_prods[i]) {
    ## Extract Proper Version for matching
    intel_bios_ver = split(bios_ver, sep:".");
    intel_bios_ver = intel_bios_ver[0] + intel_bios_ver[1] + (intel_bios_ver[2] - ".");

    ## with respect to particular product i.e aff_prods
    if(version_is_less(version:intel_bios_ver, test_version:fix_prod_ver[i])) {
      report = report_fixed_ver(installed_version:intel_bios_ver, fixed_version:fix_prod_ver[i]);
      security_message(port:0, data:report);
      exit(0);
    }
  }
}

exit(99);

4.6 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

6.5 Medium

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

37.2%

Related for OPENVAS:1361412562310800164