First published: Thu Nov 14 2019(Updated: )
Insufficient input validation in Intel(R) SGX SDK multiple Linux and Windows versions may allow an authenticated user to enable information disclosure, escalation of privilege or denial of service via local access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Intel Software Guard Extensions | =2.3.100.49777 | |
Intel Software Guard Extensions | =2.3.101.50222 | |
Intel Software Guard Extensions | =2.4.100.51291 | |
Microsoft Windows | ||
Intel Software Guard Extensions | =2.2.100.45311 | |
Intel Software Guard Extensions | =2.3.100.46354 | |
Intel Software Guard Extensions | =2.4.100.48163 | |
Intel Software Guard Extensions | =2.5.100.49891 | |
Intel Software Guard Extensions | =2.6.100.51363 | |
Linux kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-14566 is a vulnerability in Intel SGX SDK that allows an authenticated user to enable information disclosure, escalation of privilege, or denial of service via local access.
CVE-2019-14566 affects Intel SGX SDK versions 2.3.100.49777, 2.3.101.50222, and 2.4.100.51291.
No, Microsoft Windows is not vulnerable to CVE-2019-14566.
CVE-2019-14566 has a severity score of 7.8 (high).
To fix CVE-2019-14566, update your Intel SGX SDK to a non-vulnerable version as specified in the advisory from Intel.