CVE-2019-0154
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
14/11/2019
Last modified:
07/11/2023
Description
Insufficient access control in subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6 and E-2100 Processor Families may allow an authenticated user to potentially enable denial of service via local access.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Base Score 2.0
2.10
Severity 2.0
LOW
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:* | ||
cpe:2.3:o:intel:pentium_j4205_firmware:*:*:*:*:*:windows:*:* | 26.20.100.6859 (excluding) | |
cpe:2.3:h:intel:pentium_j4205:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:intel:pentium_n4200_firmware:*:*:*:*:*:windows:*:* | 26.20.100.6859 (excluding) | |
cpe:2.3:h:intel:pentium_n4200:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:intel:celeron_j3355_firmware:*:*:*:*:*:windows:*:* | 26.20.100.6859 (excluding) | |
cpe:2.3:h:intel:celeron_j3355:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:intel:celeron_j3455_firmware:*:*:*:*:*:windows:*:* | 26.20.100.6859 (excluding) | |
cpe:2.3:h:intel:celeron_j3455:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:intel:celeron_n3350_firmware:*:*:*:*:*:windows:*:* | 26.20.100.6859 (excluding) | |
cpe:2.3:h:intel:celeron_n3350:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:intel:celeron_n3450_firmware:*:*:*:*:*:windows:*:* | 26.20.100.6859 (excluding) | |
cpe:2.3:h:intel:celeron_n3450:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:intel:atom_x5-a3930_firmware:*:*:*:*:*:windows:*:* | 26.20.100.6859 (excluding) | |
cpe:2.3:h:intel:atom_x5-a3930:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://packetstormsecurity.com/files/155375/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- https://access.redhat.com/errata/RHSA-2020:0204
- https://seclists.org/bugtraq/2019/Nov/26
- https://security.netapp.com/advisory/ntap-20200320-0004/
- https://support.f5.com/csp/article/K73659122?utm_source=f5support&%3Butm_medium=RSS
- https://usn.ubuntu.com/4186-2/
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html