#VU17800 Improper input validation in Data Center Manager SDK


Published: 2019-02-20

Vulnerability identifier: #VU17800

Vulnerability risk: Low

CVSSv3.1: 3.5 [CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-0112

CWE-ID: CWE-20

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Data Center Manager SDK
Client/Desktop applications / File managers, FTP clients

Vendor: Intel

Description
The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to improper flow control in crypto routines for Intel(R) Data Center Manager SDK. A remote attacker can trick the victim into processing a specially crafted input and cause the service to crash.

Mitigation
Update to version 5.0.2.

Vulnerable software versions

Data Center Manager SDK: 5.0.0 - 5.0.1


External links
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00215.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability