{"containers":{"cna":{"affected":[{"product":"Intel(R) Server Boards, Server Systems and Compute Modules Advisory","vendor":"n/a","versions":[{"status":"affected","version":"Before version 1.59"}]}],"descriptions":[{"lang":"en","value":"Buffer overflow in daemon for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access."}],"problemTypes":[{"descriptions":[{"description":"Escalation of Privilege","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2020-08-14T11:06:12.000Z","orgId":"6dda929c-bb53-4a77-a76d-48e79601a1ce","shortName":"intel"},"references":[{"tags":["x_refsource_MISC"],"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"},{"tags":["x_refsource_CONFIRM"],"url":"https://security.netapp.com/advisory/ntap-20200814-0002/"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"secure@intel.com","ID":"CVE-2020-8707","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Intel(R) Server Boards, Server Systems and Compute Modules Advisory","version":{"version_data":[{"version_value":"Before version 1.59"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Buffer overflow in daemon for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Escalation of Privilege"}]}]},"references":{"reference_data":[{"name":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html","refsource":"MISC","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"},{"name":"https://security.netapp.com/advisory/ntap-20200814-0002/","refsource":"CONFIRM","url":"https://security.netapp.com/advisory/ntap-20200814-0002/"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T10:03:46.267Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://security.netapp.com/advisory/ntap-20200814-0002/"}]}]},"cveMetadata":{"assignerOrgId":"6dda929c-bb53-4a77-a76d-48e79601a1ce","assignerShortName":"intel","cveId":"CVE-2020-8707","datePublished":"2020-08-13T02:27:58.000Z","dateReserved":"2020-02-06T00:00:00.000Z","dateUpdated":"2024-08-04T10:03:46.267Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}