{"id":12646,"date":"2020-01-17T00:41:08","date_gmt":"2020-01-16T23:41:08","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=12646"},"modified":"2021-12-26T00:47:28","modified_gmt":"2021-12-25T23:47:28","slug":"intel-sicherheitswarnungen-14-januar-2020","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2020\/01\/17\/intel-sicherheitswarnungen-14-januar-2020\/","title":{"rendered":"Intel security advisories (January 14, 2020)"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" height=\"47\" align=\"left\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/2020\/01\/17\/intel-sicherheitswarnungen-14-januar-2020\/\" target=\"_blank\" rel=\"noopener noreferrer\">German<\/a>]Intel published security advisories on January 14, 2020 on various vulnerabilities in its products. These security advisories refer to fixes or workarounds for vulnerabilities identified in Intel products.<\/p>\n<p><!--more--><\/p>\n<p>Blog reader Ismail has additionally informed me by mail about<a href=\"https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/default.html\" target=\"_blank\" rel=\"noopener noreferrer\"> these security warnings<\/a>, which are available on this Intel page.<\/p>\n<ul>\n<li><a href=\"https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00332.html\" target=\"_blank\" rel=\"noopener noreferrer\">Intel\u00ae DAAL Advisory<\/a>: INTEL-SA-00332, A potential vulnerability in Intel\u00ae Data Analytics Acceleration Library (DAAL) could allow information disclosure. Intel is releasing software updates to address this potential vulnerability.<\/li>\n<li><a href=\"https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00325.html\" target=\"_blank\" rel=\"noopener noreferrer\">Intel\u00ae VTune\u2122 Amplifier for Windows* Advisory<\/a>: INTEL-SA-00325, A potential vulnerability in Intel\u00ae VTune\u2122 amplifier for Windows* may allow an escalation of privilege. Intel is releasing software updates to address this potential vulnerability.\u00a0 <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2019-14613\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2019-14613<\/a> describes that improper access control in the driver for Intel(R) VTune(TM) Amplifier for Windows* prior to update 8 may allow an authenticated user to enable escalation of privilege via local access.<\/li>\n<li><a href=\"https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00314.html\" target=\"_blank\" rel=\"noopener noreferrer\">Intel\u00ae Processor Graphics Advisory<\/a>: INTEL-SA-00314, A potential vulnerability in Intel\u00ae Processor Graphics may allow information disclosure. Intel will release software updates to address this potential vulnerability.<\/li>\n<li><a href=\"https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00308.html\" target=\"_blank\" rel=\"noopener noreferrer\">Intel\u00ae RWC 3 for Windows* Advisory<\/a>: INTEL-SA-00308: A potential security vulnerability in Intel\u00ae RAID Web Console (RWC) 3 for Windows* may allow permissions to be escalated. Intel is releasing software updates to address this potential vulnerability. <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2019-14601\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2019-14601<\/a>: Incorrect permissions in the Intel(R) RWC 3 for Windows installer prior to version 7.010.009.000 could allow an authenticated user to potentially enable permission escalation via local access.<\/li>\n<li><a href=\"https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00306.html\" target=\"_blank\" rel=\"noopener noreferrer\">Intel\u00ae Chipset Device Software Advisory<\/a>: INTEL-SA-00306, a potential security vulnerability in the Intel\u00ae Chipset Device Software INF Utility may allow the disclosure of information. Intel is releasing software updates to address this potential vulnerability.<\/li>\n<li><a href=\"https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00300.html\" target=\"_blank\" rel=\"noopener noreferrer\">Intel\u00ae SNMP Subagent Stand-Alone Advisory for Windows*<\/a>: INTEL-SA-00300, a potential vulnerability in the Intel\u00ae SNMP Subagent Stand-Alone for Windows* can allow permissions to escalate. Intel is not releasing updates to address this potential vulnerability and has issued a product announcement for Intel\u00ae SNMP Subagent Stand-Alone for Windows*.<\/li>\n<\/ul>\n<p>More details can be found in the linked individual articles. Bleeping Computer has published something <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/intel-patches-high-severity-flaw-in-vtune-performance-profiler\/\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>, and there is also <a href=\"https:\/\/web.archive.org\/web\/20210509202153\/https:\/\/blogs.intel.com\/technology\/2020\/01\/ipas-security-advisories-for-january-2020-2\/\" target=\"_blank\" rel=\"noopener noreferrer\">this blog post<\/a> from Intel.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]Intel published security advisories on January 14, 2020 on various vulnerabilities in its products. These security advisories refer to fixes or workarounds for vulnerabilities identified in Intel products.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,1547],"tags":[69],"class_list":["post-12646","post","type-post","status-publish","format-standard","hentry","category-security","category-software","tag-security"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/12646","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=12646"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/12646\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=12646"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=12646"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=12646"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}