-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2019.0240
               Intel Computing Improvement Program Advisory
                              14 August 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Intel Computing Improvement Program
Operating System:     Windows
Impact/Access:        Execute Arbitrary Code/Commands -- Existing Account
                      Denial of Service               -- Existing Account
                      Access Confidential Data        -- Existing Account
Resolution:           Patch/Upgrade
CVE Names:            CVE-2019-11162  
Member content until: Friday, September 13 2019

OVERVIEW

        Intel has discovered a potential security vulnerability in Intel 
        Computing Improvement Program. [1]


IMPACT

        Intel has provided the following information regarding the vulnerability:
        
        "Summary:
        
        A potential security vulnerability in the Intel Computing Improvement 
        Program may allow escalation of privilege, denial of service or 
        information disclosure.
        
        Intel is releasing software updates to mitigate this potential 
        vulnerability.
        
        Vulnerability Details:
        
        CVEID: CVE-2019-11162
        
        Description: Insufficient access control in hardware abstraction in 
        SEMA driver for Inte Computing Improvement Program before version 
        2.4.0.04733 may allow an authenticated user to potentially enable 
        escalation of privilege, denial of service or information disclosure 
        via local access.
        
        CVSS Base Score: 8.2 High
        
        CVSS Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" [1]


MITIGATION

        Intel recommends that users of the Intel Computing Improvement Program update
        to the latest version. [1]


REFERENCES

        [1] Intel Computing Improvement Program Advisory
            https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00283.html

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=HF15
-----END PGP SIGNATURE-----