Lucene search

K
symantecSymantec Security ResponseSMNTC-110846
HistoryNov 12, 2019 - 12:00 a.m.

Intel Xeon Scalable Processors CVE-2019-11139 Denial of Service Vulnerability

2019-11-1200:00:00
Symantec Security Response
www.symantec.com
84

EPSS

0

Percentile

14.2%

Description

Intel Xeon Scalable Processors are prone to a denial-of-service vulnerability. An attacker can exploit this issue to cause a denial-of-service condition.

Technologies Affected

  • Intel Xeon Scalable Processors
  • Redhat Enterprise Linux 5
  • Redhat Enterprise Linux 6
  • Redhat Enterprise Linux 7
  • Redhat Enterprise Linux 8
  • Ubuntu Ubuntu Linux 14.04 ESM
  • Ubuntu Ubuntu Linux 16.04 LTS
  • Ubuntu Ubuntu Linux 18.04 LTS
  • Ubuntu Ubuntu Linux 19.04
  • Ubuntu Ubuntu Linux 19.10

Recommendations

Permit local access for trusted individuals only. Where possible, use restricted environments and restricted shells.
Allow only trusted individuals to have user accounts and local access to the resources.

Block external access at the network boundary, unless external parties require service.
If global access isnโ€™t needed, filter access to the affected device at the network boundary. Restricting access to only trusted computers and networks might greatly reduce the likelihood of a successful exploit.

Updates are available. Please see the references or vendor advisory for more information.

References