AESM daemon in Intel Software Guard Extensions Platform Software Component for Linux before 2.1.102 can effectively be disabled by a local attacker creating a denial of services like remote attestation provided by the AESM.
References
| Link | Resource |
|---|---|
| https://cdrdv2.intel.com/v1/dl/getContent/685355 | Broken Link Vendor Advisory |
| https://cdrdv2.intel.com/v1/dl/getContent/685355 | Broken Link Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
21 Nov 2024, 04:05
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://cdrdv2.intel.com/v1/dl/getContent/685355 - Broken Link, Vendor Advisory |
23 Nov 2021, 22:14
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:intel:software_guard_extensions:-:*:*:*:*:*:*:* | |
| CWE | NVD-CWE-noinfo | |
| References | (CONFIRM) https://cdrdv2.intel.com/v1/dl/getContent/685355 - Broken Link, Vendor Advisory |
19 Nov 2021, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
Information
Published : 2018-04-03 16:29
Updated : 2024-11-21 04:05
NVD link : CVE-2018-3689
Mitre link : CVE-2018-3689
CVE.ORG link : CVE-2018-3689
JSON object : View
Products Affected
intel
- software_guard_extensions
linux
- linux_kernel
CWE
