SB2021020976 - Multiple vulnerabilities in Intel Graphics Drivers
Published: February 9, 2021 Updated: June 21, 2021
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 22 secuirty vulnerabilities.
1) Resource management error (CVE-ID: CVE-2020-0544)
The vulnerability allows a local usre to escalate privileges on the system.
The vulnerability exists due to improper management of internal resources within the application. A local user can escalate privileges on the system.
2) Buffer overflow (CVE-ID: CVE-2020-12373)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.47. A local privileged user can trigger memory corruption and execute arbitrary code on the target system with elevated privileges.
3) Resource management error (CVE-ID: CVE-2020-0521)
The vulnerability allows a local usre to escalate privileges on the system.
The vulnerability exists due to improper management of internal resources within the application. A local user can escalate privileges on the system.
4) Integer overflow (CVE-ID: CVE-2020-12368)
The vulnerability allows a local user to escalate privileges on the system.
5) Integer overflow (CVE-ID: CVE-2020-12367)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to integer overflow. A local user can run a specially crafted program to escalate privileges on the system.
6) Improper access control (CVE-ID: CVE-2020-0518)
The vulnerability allows a local user to perform a denial of service attack.
The vulnerability exists due to improper access restrictions in Intel(R) HD Graphics Control Panel. A local user can crash the system.
7) Improper access control (CVE-ID: CVE-2020-8678)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to improper access restrictions. A local user can run a specially crafted program to escalate privileges on the system.
8) Untrusted search path (CVE-ID: CVE-2020-24450)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to an untrusted search path in the installer. A local user can gain elevated prvileges on the target system.
9) Use-after-free (CVE-ID: CVE-2020-12361)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a use-after-free error. A local user can run a specially crafted program to perform a denial of service (DoS) attack.
10) Integer overflow (CVE-ID: CVE-2020-12362)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to integer overflow. A local user can run a specially crafted program to trigger integer overflow and execute arbitrary code with elevated privileges.
11) Out-of-bounds write (CVE-ID: CVE-2020-12369)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error. A local user can tun a specially crafted program to trigger an out-of-bounds write and execute arbitrary code with elevated privileges.
12) Input validation error (CVE-ID: CVE-2020-12385)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to insufficient validation of user-supplied input. A local user can run a specially crafted program to execute arbitrary code with elevated privileges.
13) Untrusted Pointer Dereference (CVE-ID: CVE-2020-12365)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error. A local user can run a specially crafted program to trigger pointer dereference and cause a denial of service condition.
14) Input validation error (CVE-ID: CVE-2020-12366)
The vulnerability allows a local user to escalate privileges on the system.
15) Uncaught Exception (CVE-ID: CVE-2020-24448)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to uncaught exception. A local user can run a specially crafted program to trigger a denial of service condition.
16) Out-of-bounds write (CVE-ID: CVE-2020-12386)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error when processing untrusted input. A local user can run a specially crafted program to trigger an out-of-bounds write error and crash the system.
17) Improper access control (CVE-ID: CVE-2020-12384)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to improper access restrictions. A local user can run a specially crafted program to escalate privileges on the system.18) Input validation error (CVE-ID: CVE-2020-12363)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input. A local user can run a specially crafted program to perform a denial of service (DoS) attack.
19) NULL pointer dereference (CVE-ID: CVE-2020-12364)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error. A local user can run a specially crafted program to perform a denial of service (DoS) attack.
20) Untrusted Pointer Dereference (CVE-ID: CVE-2020-12370)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error. A local user can run a specially crafted program to trigger pointer dereference and cause a denial of service condition.21) Division by zero (CVE-ID: CVE-2020-12371)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a divide by zero error. A local user can run a specially crafted program to trigger division by zero and crash the system.22) Unchecked Return Value (CVE-ID: CVE-2020-12372)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an unchecked return value. A local user can run a specially crafted program to cause a denial of service condition.Remediation
Install update from vendor's website.