René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

109 lines
3.5 KiB
JSON

{
"id": "CVE-2006-7215",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-07-03T21:30:00.000",
"lastModified": "2008-09-05T21:16:43.043",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The Intel Core 2 Extreme processor X6800 and Core 2 Duo desktop processor E6000 and E4000 incorrectly set the memory page Access (A) bit for a page in certain circumstances involving proximity of the code segment limit to the end of a code page, which has unknown impact and attack vectors on certain operating systems other than OpenBSD, aka AI90."
},
{
"lang": "es",
"value": "El procesador Intel Core 2 Extreme X6800 y Core 2 Duo desktop E6000 y E4000 establecen incorrectamente el bit de Acceso (A) a p\u00e1gina de memoria para una p\u00e1gina bajo ciertas circunstancias que implican la proximidad del l\u00edmite de segmento de c\u00f3digo con el final de una p\u00e1gina de c\u00f3digo, lo cual tiene impacto y vectores desconocidos en ciertos sistemas operativos que no son OpenBSD, tambi\u00e9n conocido como AI90."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1
},
"baseSeverity": "LOW",
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:h:intel:core_2_duo_e4000:*:*:*:*:*:*:*:*",
"matchCriteriaId": "34F7672A-3CAF-46EB-B05D-A4AF58D4EE12"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:intel:core_2_duo_e6000:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9A87047F-6E66-46DD-B9EE-15EE13ADE359"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:intel:core_2_extreme_x6800:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1BFFC34B-4182-40E7-A40E-0DB23A3ADA3A"
}
]
}
]
}
],
"references": [
{
"url": "http://download.intel.com/design/processor/specupdt/31327914.pdf",
"source": "cve@mitre.org"
},
{
"url": "http://marc.info/?l=openbsd-misc&m=118296441702631&w=2",
"source": "cve@mitre.org"
},
{
"url": "http://seclists.org/fulldisclosure/2007/Jun/0605.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.matasano.com/log/894/theo-de-raadt-intel-core-2-bugs-assuredly-exploitable-from-userland/",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/24702",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}