{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"RWC 3 pour Windows versions ant\u00e9rieures \u00e0 7.010.009.000","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Processor Graphics Driver versions ant\u00e9rieures \u00e0 15.45.x.5077","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel SNMP Subagent Stand-Alone pour Windows (produit en fin de vie)","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"i915 Linux Driver pour noyaux Linux versions ant\u00e9rieures \u00e0 4.19.96 (LTS)","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Chipset Device Software INF Utility versions ant\u00e9rieures \u00e0 10.1.18","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Processor Graphics Driver versions ant\u00e9rieures \u00e0 26.20.100.7209","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"i915 Linux Driver pour noyaux Linux versions ant\u00e9rieures \u00e0 4.9.210 (LTS)","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel VTune Amplifier pour Windows versions ant\u00e9rieures \u00e0 update 8","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"i915 Linux Driver pour noyaux Linux versions ant\u00e9rieures \u00e0 4.4.210 (LTS)","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"i915 Linux Driver pour noyaux Linux versions ant\u00e9rieures \u00e0 5.4.12 (Stable)","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Processor Graphics Driver versions ant\u00e9rieures \u00e0 15.36.x.5117","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel DAAL versions ant\u00e9rieures \u00e0 2020 Gold","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Processor Graphics Driver versions ant\u00e9rieures \u00e0 15.33.x.5122","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Processor Graphics Driver versions ant\u00e9rieures \u00e0 15.40.x.5107","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"i915 Linux Driver pour noyaux Linux versions ant\u00e9rieures \u00e0 4.14.165 (LTS)","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"i915 Linux Driver pour noyaux Linux versions ant\u00e9rieures \u00e0 5.5-rc6 (Mainline)","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2019-14601","url":"https://www.cve.org/CVERecord?id=CVE-2019-14601"},{"name":"CVE-2019-14629","url":"https://www.cve.org/CVERecord?id=CVE-2019-14629"},{"name":"CVE-2019-14613","url":"https://www.cve.org/CVERecord?id=CVE-2019-14613"},{"name":"CVE-2019-14615","url":"https://www.cve.org/CVERecord?id=CVE-2019-14615"},{"name":"CVE-2019-14596","url":"https://www.cve.org/CVERecord?id=CVE-2019-14596"},{"name":"CVE-2019-14600","url":"https://www.cve.org/CVERecord?id=CVE-2019-14600"}],"links":[],"reference":"CERTFR-2020-AVI-033","revisions":[{"description":"Version initiale","revision_date":"2020-01-15T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel.\nElles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service, une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation de\nprivil\u00e8ges.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00314 du 14 janvier 2020","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00314.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00332 du 14 janvier 2020","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00332.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00308 du 14 janvier 2020","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00308.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00300 du 14 janvier 2020","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00300.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00325 du 14 janvier 2020","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00325.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00306 du 14 janvier 2020","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00306.html"}]}
