Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2009-0066
Analyzed
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-07 Jan, 2009 | 19:30
Updated At-08 Jan, 2009 | 05:00

Multiple unspecified vulnerabilities in Intel system software for Trusted Execution Technology (TXT) allow attackers to bypass intended loader integrity protections, as demonstrated by exploitation of tboot. NOTE: as of 20090107, the only disclosure is a vague pre-advisory with no actionable information. However, because it is from a well-known researcher, it is being assigned a CVE identifier for tracking purposes.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.07.6HIGH
AV:N/AC:H/Au:N/C:C/I:C/A:C
CPE Matches

Intel Corporation
intel
>>trusted_execution_technology>>_nil_
cpe:2.3:a:intel:trusted_execution_technology:_nil_:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-noinfoPrimarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Wojtczukcve@mitre.org
N/A
http://invisiblethingslab.com/press/itl-press-2009-01.pdfcve@mitre.org
N/A
http://theinvisiblethings.blogspot.com/2009/01/attacking-intel-trusted-execution.htmlcve@mitre.org
N/A
http://www.securityfocus.com/bid/33119cve@mitre.org
N/A
Change History
0Changes found

Details not found