Intel® Active System Console v4.4 and Intel® Multi-Server Manager v1.0 Denial of Service
Intel® Active System Console is a lightweight console that gives basic server hardware healthy monitoring capabilities on single server. Intel® Multi-Server Manager allows IT administrators to manage server hardware healthy for group of servers from a single console. Intel is releasing a software update to mitigate a denial of service issue with Intel® Active System Console version 4.4 and Intel® Multi-Server Manager version 1.0.
Under certain circumstances, a remote malicious attacker could leverage this issue in the Intel® Active System Console version 4.4 and Intel® Multi-Server Manager version 1.0 to cause the systems running the affected products to become non-responsive to legitimate users. This issue was reported by a business partner. Intel is releasing a software update to mitigate this issue.
This issue does not affect other versions of Intel® Active System Console and Intel® Multi-Server Manager.
Use the following steps to determine the version of the Intel® Active System Console and Intel® Multi-Server Manager installed:
- Intel® Active System Console version
- Refer http://support.intel.com/support/motherboards/server/sysmgmt/sb/CS-032692.htm for Q&A of how to identify Intel® Active System Console version 4.4.
- Intel® Multi-Server Manager version
- Login to Intel® Multi-Server Manager
- Click “Help” from the top of menu bar
- Click “About” menu. Intel® Multi-Server Manager version is shown on the popup window.
Intel has developed software update version 002 for Intel® Active System Console version 4.4 and Intel® Multi-Server Manager version 1.0 to mitigate this issue. Intel highly recommends the customers to apply this update to the affected products. Customers can obtain the software update version 002 from the URLs below:
- Patch Release for Intel(R) Multi Server Manager 1.0
- Patch Release for Intel(R) Active System Console 4.4
Follow the instructions in Read Me and/or Release Note document of the software update version 002 to install the update.
Legal Notices and Disclaimers
Intel provides these materials as-is, with no express or implied warranties.
All products, dates, and figures specified are preliminary based on current expectations, and are subject to change without notice.
Intel, processors, chipsets, and desktop boards may contain design defects or errors known as errata, which may cause the product to deviate from published specifications. Current characterized errata are available on request.
Intel technologies’ features and benefits depend on system configuration and may require enabled hardware, software or service activation. Performance varies depending on system configuration. No computer system can be absolutely secure. Check with your system manufacturer or retailer or learn more at https://intel.com.
Some results have been estimated or simulated using internal Intel analysis or architecture simulation or modeling, and provided to you for informational purposes. Any differences in your system hardware, software or configuration may affect your actual performance.
Intel and the Intel logo are trademarks of Intel Corporation in the United States and other countries.
*Other names and brands may be claimed as the property of others.
Copyright © Intel Corporation 2019
Report a Vulnerability
If you have information about a security issue or vulnerability with an Intel branded product or technology, please send an e-mail to firstname.lastname@example.org. Encrypt sensitive information using our PGP public key.
Please provide as much information as possible, including:
- The products and versions affected
- Detailed description of the vulnerability
- Information on known exploits
A member of the Intel Product Security Team will review your e-mail and contact you to collaborate on resolving the issue. For more information on how Intel works to resolve security issues, see:
For issues related to Intel's external web presence (Intel.com and related subdomains), please contact Intel's External Security Research team.