CVE-2020-0591

Beschreibung:
Improper buffer restrictions in BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

CWE: CWE-119

CVSS-Bewertung
CVSS 2: MEDIUM – 4.6 (Version: 2.0)
CVSS 3: MEDIUM – 6.7 (Version: 3.1)

Links:

NVD – CVE-2020-0591
CVE – CVE-2020-0591

Link (max. 20) Quelle Tags
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00358 MISC Vendor Advisory Patch Third Party Advisory
https://security.netapp.com/advisory/ntap-20201113-0001/ CONFIRM Third Party Advisory Vendor Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-501073.pdf CONFIRM Third Party Advisory Vendor Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf CONFIRM Mailing List Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf CONFIRM Mailing List Vendor Advisory
[oss-security] 20201124 CVE-2020-13942: Remote Code Execution in Apache Unomi MLIST Mailing List Third Party Advisory
[announce] 20201124 CVE-2020-13942: Remote Code Execution in Apache Unomi MLIST Mailing List Vendor Advisory
https://advisory.checkmarx.net/advisory/CX-2020-4284 MISC Exploit Third Party Advisory
[unomi-commits] 20210428 svn commit: r1889256 – in /unomi/website: contribute-release-guide.html documentation.html download.html index.html security/cve-2021-31164.txt MLIST Exploit Mailing List Vendor Advisory

Quelle: NVD – CVE-2020-0591
Datum Veröffentlichung: 2020-11-12T18:15Z, Datum letzte Änderung: 2021-05-11T13:15Z