Unspecified vulnerability in the Intel Trusted Execution Technology (TXT) SINIT Authenticated Code Modules (ACM) before 1.2, as used by the Intel QM77, QS77, Q77 Express, C216, Q67 Express, C202, C204, and C206 chipsets and Mobile Intel QM67 and QS67 chipsets, when the measured launch environment (MLE) is invoked, allows local users to bypass the Trusted Execution Technology protection mechanism and perform other unspecified SINIT ACM functions via unspecified vectors.
Name | Vendor | Start Version | End Version |
---|---|---|---|
C202_chipset | Intel | - (including) | - (including) |
C204_chipset | Intel | - (including) | - (including) |
C206_chipset | Intel | - (including) | - (including) |
C216_chipset | Intel | - (including) | - (including) |
Mobile_intel_qm67_chipset | Intel | - (including) | - (including) |
Mobile_intel_qs67_chipset | Intel | - (including) | - (including) |
Q67_express_chipset | Intel | - (including) | - (including) |
Qm77_chipset | Intel | - (including) | - (including) |
Qs77_chipset | Intel | - (including) | - (including) |
Trusted_execution_technology_sinit_authenticated_code_module | Intel | * | 1.1 (including) |