Unspecified vulnerability in the Intel Trusted Execution Technology (TXT) SINIT Authenticated Code Modules (ACM) before 1.2, as used by the Intel QM77, QS77, Q77 Express, C216, Q67 Express, C202, C204, and C206 chipsets and Mobile Intel QM67 and QS67 chipsets, when the measured launch environment (MLE) is invoked, allows local users to bypass the Trusted Execution Technology protection mechanism and perform other unspecified SINIT ACM functions via unspecified vectors.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:58
Type | Values Removed | Values Added |
---|---|---|
References | () http://support.citrix.com/article/CTX138633 - | |
References | () https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00035&languageid=en-fr - Vendor Advisory |
Information
Published : 2013-09-12 18:37
Updated : 2024-11-21 01:58
NVD link : CVE-2013-5740
Mitre link : CVE-2013-5740
CVE.ORG link : CVE-2013-5740
JSON object : View
Products Affected
intel
- qm77_chipset
- mobile_intel_qs67_chipset
- mobile_intel_qm67_chipset
- c216_chipset
- c204_chipset
- q67_express_chipset
- c206_chipset
- qs77_chipset
- c202_chipset
- trusted_execution_technology_sinit_authenticated_code_module
CWE