"-Synchronized-Data."

This commit is contained in:
CVE Team 2020-11-11 18:01:49 +00:00
parent 59484ff868
commit e109200cef
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
4 changed files with 13 additions and 10 deletions

View File

@ -41,7 +41,7 @@
"description_data": [
{
"lang": "eng",
"value": "Scheduler for TAS prior to version 1.4.0 was permitting plaintext transmission of UAA client token by sending it over a non-TLS connection. This also depended on the configuration of the MySQL server which is used to cache a UAA client token used by the service.\nIf intercepted the token can give an attacker admin level access in the cloud controller."
"value": "Scheduler for TAS prior to version 1.4.0 was permitting plaintext transmission of UAA client token by sending it over a non-TLS connection. This also depended on the configuration of the MySQL server which is used to cache a UAA client token used by the service. If intercepted the token can give an attacker admin level access in the cloud controller."
}
]
},

View File

@ -41,7 +41,7 @@
"description_data": [
{
"lang": "eng",
"value": "In some Lenovo Desktop models, the Configuration Change Detection BIOS setting failed to detect SATA configuration changes. "
"value": "In some Lenovo Desktop models, the Configuration Change Detection BIOS setting failed to detect SATA configuration changes."
}
]
},
@ -79,8 +79,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://support.lenovo.com/us/en/product_security/LEN-49266"
"refsource": "MISC",
"url": "https://support.lenovo.com/us/en/product_security/LEN-49266",
"name": "https://support.lenovo.com/us/en/product_security/LEN-49266"
}
]
},

View File

@ -73,15 +73,16 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://support.lenovo.com/us/en/product_security/LEN-44725"
"refsource": "MISC",
"url": "https://support.lenovo.com/us/en/product_security/LEN-44725",
"name": "https://support.lenovo.com/us/en/product_security/LEN-44725"
}
]
},
"solution": [
{
"lang": "eng",
"value": "Use the Intel® AMT Configuration Utility 12.2.0.150 or later to verify the EHBC is enabled. \nCheck EHBC Status: ACUConfig.exe /verbose /output console Status\nTo disable Intel EHBC: ACUConfig.exe DisableEhbcState"
"value": "Use the Intel\u00ae AMT Configuration Utility 12.2.0.150 or later to verify the EHBC is enabled. \nCheck EHBC Status: ACUConfig.exe /verbose /output console Status\nTo disable Intel EHBC: ACUConfig.exe DisableEhbcState"
}
],
"source": {

View File

@ -41,7 +41,7 @@
"description_data": [
{
"lang": "eng",
"value": "A potential vulnerability in the SMI callback function used in the VariableServiceSmm driver in some Lenovo Notebook models may allow arbitrary code execution. "
"value": "A potential vulnerability in the SMI callback function used in the VariableServiceSmm driver in some Lenovo Notebook models may allow arbitrary code execution."
}
]
},
@ -79,8 +79,9 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://support.lenovo.com/us/en/product_security/LEN-49266"
"refsource": "MISC",
"url": "https://support.lenovo.com/us/en/product_security/LEN-49266",
"name": "https://support.lenovo.com/us/en/product_security/LEN-49266"
}
]
},