CVE-2017-5682
Published Feb 28, 2017
Last updated 5 years ago
Overview
- Description
- Intel PSET Application Install wrapper of Intel Parallel Studio XE, Intel System Studio, Intel VTune Amplifier, Intel Inspector, Intel Advisor, Intel MPI Library, Intel Trace Analyzer and Collector, Intel Integrated Performance Primitives, Cryptography for Intel Integrated Performance Primitives, Intel Math Kernel Library, Intel Data Analytics Acceleration Library, and Intel Threading Building Blocks before 2017 Update 2 allows an attacker to launch a process with escalated privileges.
- Source
- secure@intel.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 7.3
- Impact score
- 5.9
- Exploitability score
- 1.3
- Vector string
- CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 9.3
- Impact score
- 10
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- NVD-CWE-noinfo
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:advisor:2017:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "83E6F5FC-D325-4C8C-82E9-82B5FFCEB083" }, { "criteria": "cpe:2.3:a:intel:cryptography_for_intel_integrated_performance_primitives:2017:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "91AFB020-6F26-4D0D-A373-5E6341975421" }, { "criteria": "cpe:2.3:a:intel:data_analytics_acceleration_library:2017:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B40F7BDC-1317-480B-9B23-1F13758543D6" }, { "criteria": "cpe:2.3:a:intel:inspector:2017:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D9644872-437C-4AD5-9D7C-811E527CC13B" }, { "criteria": "cpe:2.3:a:intel:integrated_performance_primitives:2017:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B67785D4-D084-4C3E-81E6-B6C5BD110885" }, { "criteria": "cpe:2.3:a:intel:math_kernel_library:2017:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7B94882E-342F-4D87-A0D2-6F0C9282B096" }, { "criteria": "cpe:2.3:a:intel:mpi_library:2017:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6B60FA44-7160-4D1A-98AE-744FC2C91B88" }, { "criteria": "cpe:2.3:a:intel:parallel_studio_xe:2017:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E9DFA92D-02DD-4623-A7A5-B7780CE24996" }, { "criteria": "cpe:2.3:a:intel:system_studio:2017:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1314F593-5448-4458-A7FF-A479909C0147" }, { "criteria": "cpe:2.3:a:intel:threading_building_blocks:2017:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "096729CA-6729-480D-BEDD-B294DCB3B789" }, { "criteria": "cpe:2.3:a:intel:trace_analyzer_and_collector:2017:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "73D61D38-EC35-4C15-996C-28484709A42D" }, { "criteria": "cpe:2.3:a:intel:vtune_amplifier:2017:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C3A8F80A-95C3-44A1-BB71-8E1A3581B8D2" } ], "operator": "OR" } ] } ]