The latest security information on Intel® products.

Intel® Desktop Boards Privilege Escalation

Intel ID INTEL-SA-00022
Product family Intel® Desktop
Impact of vulnerability Elevation of Privilege
Severity rating Important
Original release Feb 01, 2010
Last revised Feb 16, 2010

Summary: 

Software running administrative (ring 0) privilege can under certain circumstances change code running in System Management Mode.

Description: 

A new BIOS update is available for selected Intel desktop motherboards to ensure proper configuration settings. These changes would prevent a malicious user from modifying software that is run in System Management Mode (SMM). SMM is a privileged operating environment running outside of OS control. Malicious software running in this environment could therefore perform any number of operations. Administrative level privileges are required to exploit this issue.

Affected products: 

DQ43AP, DQ45CB, DQ45EK, DQ35JO, DQ35MP, DP45SG, DG43NB, DP43TF, DP55KG, DP55SB, DP55WG, DP55WB, DQ57TM, DH55TC, DH55HC, DG41KR, DB43LD, DG41MJ, DG41RQ, DG41TY, DG43GT

Recommendations: 

While Intel is not aware of any use of the vulnerabilities described in this advisory, Intel has made changes to the BIOS of Intel® Desktop Boards to mitigate this issue. It is highly recommended to apply these updates to affected motherboards.

 

To determine if you need this BIOS update check the BIOS version string. If the number is older than listed in the chart for your motherboard below you need to apply the update.

 

1) During boot, enter the BIOS setup by pressing F2.

2) Check the Main menu.

3) The 4-digit number after the '86A' or '86I' is the current BIOS version, as in this example: MQ96510H.86A.1663.2007.0319.1957

4) Press Escape to exit BIOS Setup

 

For the Intel products listed in the Affected Products table, Intel has made available updated BIOS per the table below. The updated BIOS is available at http://www.intel.com/p/en_US/support. On the 'Advanced Search' line, enter the affected product name (for example DG33BU) and click Search Support. Click on the found product, make sure you're under the support tab and select BIOS updates. Next click on the BIOS title, then follow the instructions on the download page for downloading and installing the BIOS update. Several options are available. For detailed instructions on updating your BIOS refer to http://www.intel.com/support/motherboards/desktop/sb/CS-022312.htm.

   

Desktop Board               

Fix included in this version or higher

DQ43AP

APQ4310H.86A.0031

DQ45CB

CBQ4510H.86A.0109

DQ45EK

CBQ4510H.86A.0109

DQ35JO

JOQ3510J.86A.1126

DQ35MP

JOQ3510J.86A.1126

DP55KG

KGIBX10J.86A.4236

DP55SB

KGIBX10J.86A.4236

DP55WG

KGIBX10J.86A.4236

DP55WB

WBIBX10J.86A.0181

DQ57TM

TMIBX10H.86A.0025

DH55TC

TCIBX10H.86A.0028

DH55HC

TCIBX10H.86A.0028

DG41KR

KRG4110H.86A.0029

DB43LD

LDB4310H.86A.0035

DG41MJ

MJG4110H.86A.0006

DG41RQ

RQG4110H.86A.0013

DG41TY

TYG4110H.86A.0037

DP45SG

SGP4510H.86A.0125

DG43NB

NBG4310H.86A.0104

DP43TF

NBG4310H.86A.0104

DG43GT

GTG4310H.86A.0028

Revision history:

Revision

Date

Description

1.0

01-February-2010

Initial Release

1.1

16-February-2010

Updated with additional boards

Legal Notices and Disclaimers

Intel provides these materials as-is, with no express or implied warranties.

All products, dates, and figures specified are preliminary based on current expectations, and are subject to change without notice.

Intel, processors, chipsets, and desktop boards may contain design defects or errors known as errata, which may cause the product to deviate from published specifications. Current characterized errata are available on request.

Intel technologies’ features and benefits depend on system configuration and may require enabled hardware, software or service activation. Performance varies depending on system configuration. No computer system can be absolutely secure. Check with your system manufacturer or retailer or learn more at https://intel.com.

Some results have been estimated or simulated using internal Intel analysis or architecture simulation or modeling, and provided to you for informational purposes. Any differences in your system hardware, software or configuration may affect your actual performance.

Intel and the Intel logo are trademarks of Intel Corporation in the United States and other countries.

*Other names and brands may be claimed as the property of others.
Copyright © Intel Corporation 2018

Report a Vulnerability

If you have information about a security issue or vulnerability with an Intel branded product or technology, please send an e-mail to secure@intel.com. Encrypt sensitive information using our PGP public key.

Please provide as much information as possible, including:

  • The products and versions affected
  • Detailed description of the vulnerability
  • Information on known exploits

A member of the Intel Product Security Team will review your e-mail and contact you to collaborate on resolving the issue. For more information on how Intel works to resolve security issues, see:

For issues related to Intel's external web presence (Intel.com and related subdomains), please contact Intel's External Security Research team.

For issues related to Intel managed open source projects, please visit http://www.01.org/security

Need product support?

The secure@intel.com e-mail address should only be used for reporting security issues.

If you...

  • Have questions about the security features of an Intel product
  • Require technical support
  • Want product updates or patches


Please visit Support & Downloads.