cvelist/2018/3xxx/CVE-2018-3635.json
2021-03-23 21:00:43 +00:00

72 lines
2.5 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2018-3635",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Intel Rapid Store Technology",
"version": {
"version_data": [
{
"version_value": "versions before 16.7"
}
]
}
}
]
},
"vendor_name": "Intel Corporation"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Insufficient input validation in installer in Intel Rapid Store Technology (RST) before version 16.7 may allow an unprivileged user to potentially elevate privileges or cause an installer denial of service via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Escalation of Privilege, Denial of Service"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "105984",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/105984"
},
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00153.html",
"refsource": "CONFIRM",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00153.html"
},
{
"refsource": "FULLDISC",
"name": "20210323 CVE-2018-3635 revisited: executable installers are vulnerable^WEVIL (case 60): again arbitrary code execution WITH escalation of privilege via Intel Rapid Storage Technology User Interface and Driver",
"url": "http://seclists.org/fulldisclosure/2021/Mar/55"
}
]
}
}