CVE-2011-5174

Summary

CVECVE-2011-5174
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2012-09-15 17:55:00 UTC
Updated2017-11-10 02:29:00 UTC
DescriptionBuffer overflow in Intel Trusted Execution Technology (TXT) SINIT Authenticated Code Modules (ACM) in Intel Q67 Express, C202, C204, C206 Chipsets, and Mobile Intel QM67, and QS67 Chipset before 2nd_gen_i5_i7_SINIT_51.BIN Express; Intel Q57, 3450 Chipsets and Mobile Intel QM57 and QS57 Express Chipset before i5_i7_DUAL_SINIT_51.BIN and i7_QUAD_SINIT_51.BIN; Mobile Intel GM45, GS45, and PM45 Express Chipset before GM45_GS45_PM45_SINIT_51.BIN; Intel Q35 Express Chipsets before Q35_SINIT_51.BIN; and Intel 5520, 5500, X58, and 7500 Chipsets before SINIT ACM 1.1 allows local users to bypass the Trusted Execution Technology protection mechanism and perform other unspecified SINIT ACM functions via unspecified vectors.

Risk And Classification

Problem Types: CWE-119

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Hardware Intel 3450 Chipset - All All All
Hardware Intel 3450 Chipset - All All All
Hardware Intel 5500 Chipset - All All All
Hardware Intel 5500 Chipset - All All All
Hardware Intel 5520 Chipset - All All All
Hardware Intel 5520 Chipset - All All All
Hardware Intel 7500 Chipset - All All All
Hardware Intel 7500 Chipset - All All All
Hardware Intel C202 Chipset - All All All
Hardware Intel C202 Chipset - All All All
Hardware Intel C204 Chipset - All All All
Hardware Intel C204 Chipset - All All All
Hardware Intel C206 Chipset - All All All
Hardware Intel C206 Chipset - All All All
Hardware Intel Mobile Intel Gm45 Chipset - All All All
Hardware Intel Mobile Intel Gm45 Chipset - All All All
Hardware Intel Mobile Intel Gs45 Chipset - All All All
Hardware Intel Mobile Intel Gs45 Chipset - All All All
Hardware Intel Mobile Intel Pm45 Express Chipset - All All All
Hardware Intel Mobile Intel Pm45 Express Chipset - All All All
Hardware Intel Mobile Intel Qm57 Chipset - All All All
Hardware Intel Mobile Intel Qm57 Chipset - All All All
Hardware Intel Mobile Intel Qm67 Chipset - All All All
Hardware Intel Mobile Intel Qm67 Chipset - All All All
Hardware Intel Mobile Intel Qs57 Chipset - All All All
Hardware Intel Mobile Intel Qs57 Chipset - All All All
Hardware Intel Mobile Intel Qs57 Express Chipset - All All All
Hardware Intel Mobile Intel Qs57 Express Chipset - All All All
Hardware Intel Mobile Intel Qs67 Chipset _express- All All All
Hardware Intel Mobile Intel Qs67 Chipset _express- All All All
Hardware Intel Q35 Express Chipset - All All All
Hardware Intel Q35 Express Chipset - All All All
Hardware Intel Q57 Chipset - All All All
Hardware Intel Q57 Chipset - All All All
Hardware Intel Q67 Express Chipset - All All All
Hardware Intel Q67 Express Chipset - All All All
Operating System Intel Sinit Authenticated Code Module All All All All
Operating System Intel Sinit Authenticated Code Module All All All All
Operating System Intel Sinit Authenticated Code Module All All All All
Operating System Intel Sinit Authenticated Code Module All All All All
Operating System Intel Sinit Authenticated Code Module All All All All
Operating System Intel Sinit Authenticated Code Module All All All All
Hardware Intel X58 Chipset - All All All
Hardware Intel X58 Chipset - All All All

References

ReferenceSourceLinkTags
The Invisible Things Lab's blog: Exploring new lands on Intel CPUs (SINIT code execution hijacking) MISC theinvisiblethings.blogspot.com
IBM X-Force Exchange XF exchange.xforce.ibmcloud.com
Security Advisory SA47096 - Intel Trusted Execution Technology SINIT ACMs Buffer Overflow Vulnerability - Secunia SECUNIA secunia.com Vendor Advisory
77554 OSVDB osvdb.org
Intel® Product Security Center CONFIRM security-center.intel.com
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report