Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2019-04636

Опубликовано: 09 июл. 2019
Источник: fstec
CVSS3: 5.5
CVSS2: 4.6
EPSS Средний

Описание

Уязвимость операционных систем Windows и Linux связана с отсутствием защиты служебных данных. Эксплуатация уязвимости может позволить нарушителю раскрыть защищаемую информацию с помощью специально созданного приложения

Вендор

Microsoft Corp
Red Hat Inc.
Сообщество свободного программного обеспечения
ООО «РусБИТех-Астра»
АО «Концерн ВНИИНС»

Наименование ПО

Windows 7 Service Pack 1
Windows Server 2008 Service Pack 2
Windows 8.1
Windows Server 2012
Windows Server 2012 R2
Windows Server 2008 R2 Service Pack 1
Windows RT 8.1
Red Hat Enterprise Linux
Windows 10
Windows 10 1703
Windows Server 2016
Windows Server 2008 Service Pack 1 Server Core Installation
Windows Server 2008 Service Pack 2 Server Core Installation
Windows Server 2012 R2 Server Core installation
Windows Server 2016 Server Core installation
Debian GNU/Linux
Windows 10 1709
Red Hat Enterprise MRG Realtime
Windows 10 1803
Windows Server 1803 Server Core Installation
Windows 10 1809
Windows Server 2019
Windows Server 2019 Server Core installation
Astra Linux Special Edition
Windows 10 1903
Windows Server 1903 Server Core Installation
Windows Server 2012 Server Core installation
ОС ОН «Стрелец»
Linux

Версия ПО

- (Windows 7 Service Pack 1)
- (Windows Server 2008 Service Pack 2)
- (Windows 7 Service Pack 1)
- (Windows 8.1)
- (Windows 8.1)
- (Windows Server 2008 Service Pack 2)
- (Windows Server 2012)
- (Windows Server 2012 R2)
- (Windows Server 2008 R2 Service Pack 1)
- (Windows RT 8.1)
Workstation 7 (Red Hat Enterprise Linux)
Workstation 7 (Red Hat Enterprise Linux)
Server 7 (Red Hat Enterprise Linux)
Server 7 (Red Hat Enterprise Linux)
Desktop 7 (Red Hat Enterprise Linux)
Desktop 7 (Red Hat Enterprise Linux)
- (Windows 10)
- (Windows 10)
- (Windows 10 1703)
- (Windows Server 2016)
- (Windows 10 1703)
- (Windows Server 2008 Service Pack 1 Server Core Installation)
- (Windows Server 2008 Service Pack 2 Server Core Installation)
- (Windows Server 2008 Service Pack 2 Server Core Installation)
- (Windows Server 2012 R2 Server Core installation)
- (Windows Server 2016 Server Core installation)
- (Windows Server 2008 R2 Service Pack 1)
9 (Debian GNU/Linux)
- (Windows Server 2008 Service Pack 2)
- (Windows 10 1709)
- (Windows 10 1709)
2 (Red Hat Enterprise MRG Realtime)
- (Windows 10 1803)
- (Windows 10 1803)
- (Windows Server 1803 Server Core Installation)
- (Windows 10 1809)
- (Windows 10 1809)
- (Windows Server 2019)
- (Windows Server 2019 Server Core installation)
- (Windows 10 1809)
- (Windows 10 1709)
- (Windows 10 1803)
1.6 «Смоленск» (Astra Linux Special Edition)
8.0 (Debian GNU/Linux)
- (Windows 10 1903)
- (Windows 10 1903)
- (Windows 10 1903)
- (Windows Server 1903 Server Core Installation)
Server AUS 7.3 (Red Hat Enterprise Linux)
Server AUS 7.3 (Red Hat Enterprise Linux)
Server TUS 7.3 (Red Hat Enterprise Linux)
Server TUS 7.3 (Red Hat Enterprise Linux)
Server AUS 7.2 (Red Hat Enterprise Linux)
Server AUS 7.2 (Red Hat Enterprise Linux)
Server TUS 7.2 (Red Hat Enterprise Linux)
Server AUS 6.5 (Red Hat Enterprise Linux)
Server AUS 7.4 (Red Hat Enterprise Linux)
Server TUS 7.4 (Red Hat Enterprise Linux)
Server AUS 7.7 (Red Hat Enterprise Linux)
Server EUS 7.7 (Red Hat Enterprise Linux)
Server TUS 7.7 (Red Hat Enterprise Linux)
Server TUS 7.2 (Red Hat Enterprise Linux)
Server AUS 6.5 (Red Hat Enterprise Linux)
Server AUS 7.4 (Red Hat Enterprise Linux)
Server TUS 7.4 (Red Hat Enterprise Linux)
Server AUS 7.7 (Red Hat Enterprise Linux)
Server EUS 7.7 (Red Hat Enterprise Linux)
Server TUS 7.7 (Red Hat Enterprise Linux)
- (Windows Server 2012 Server Core installation)
до 16.01.2023 (ОС ОН «Стрелец»)
от 4.0 до 4.4.188 включительно (Linux)
от 4.5 до 4.9.305 включительно (Linux)
от 4.10 до 4.14.136 включительно (Linux)
от 4.15 до 4.19.64 включительно (Linux)
от 4.20 до 5.2.6 включительно (Linux)

Тип ПО

Операционная система
Прикладное ПО информационных систем

Операционные системы и аппаратные платформы

Сообщество свободного программного обеспечения Debian GNU/Linux 9
ООО «РусБИТех-Астра» Astra Linux Special Edition 1.6 «Смоленск»
Сообщество свободного программного обеспечения Debian GNU/Linux 8.0
Сообщество свободного программного обеспечения Linux до 5.2.7
АО «Концерн ВНИИНС» ОС ОН «Стрелец» до 16.01.2023

Уровень опасности уязвимости

Средний уровень опасности (базовая оценка CVSS 2.0 составляет 4,6)
Средний уровень опасности (базовая оценка CVSS 3.0 составляет 5,5)

Возможные меры по устранению уязвимости

Использование рекомендаций:
Для Linux:
https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.137
https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.65
https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.189
https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.306
https://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.7
Для Astra Linux:
Обновление программного обеспечения (пакета linux) до 4.15.3-1astra4 или более поздней версии
Для Debian GNU/Linux:
Обновление программного обеспечения (пакета linux) до 4.19.37-5+deb10u2 или более поздней версии
Для программных продуктов Microsoft Corp.:
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1125
Для ОС ОН «Стрелец»:
Обновление программного обеспечения linux до версии 5.4.123-1~bpo10+1.osnova162.strelets

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 94%
0.13431
Средний

5.5 Medium

CVSS3

4.6 Medium

CVSS2

Связанные уязвимости

CVSS3: 5.6
ubuntu
около 6 лет назад

An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory. An attacker who successfully exploited the vulnerability could read privileged data across trust boundaries. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to elevate user rights directly, but it could be used to obtain information that could be used to try to compromise the affected system further. On January 3, 2018, Microsoft released an advisory and security updates related to a newly-discovered class of hardware vulnerabilities (known as Spectre) involving speculative execution side channels that affect AMD, ARM, and Intel CPUs to varying degrees. This vulnerability, released on August 6, 2019, is a variant of the Spectre Variant 1 speculative execution side channel vulnerability and has been assigned CVE-2019-1125. Microsoft released...

CVSS3: 5.9
redhat
около 6 лет назад

An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory. An attacker who successfully exploited the vulnerability could read privileged data across trust boundaries. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to elevate user rights directly, but it could be used to obtain information that could be used to try to compromise the affected system further. On January 3, 2018, Microsoft released an advisory and security updates related to a newly-discovered class of hardware vulnerabilities (known as Spectre) involving speculative execution side channels that affect AMD, ARM, and Intel CPUs to varying degrees. This vulnerability, released on August 6, 2019, is a variant of the Spectre Variant 1 speculative execution side channel vulnerability and has been assigned CVE-2019-1125. Microsoft released...

CVSS3: 5.6
nvd
около 6 лет назад

An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory. An attacker who successfully exploited the vulnerability could read privileged data across trust boundaries. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to elevate user rights directly, but it could be used to obtain information that could be used to try to compromise the affected system further. On January 3, 2018, Microsoft released an advisory and security updates related to a newly-discovered class of hardware vulnerabilities (known as Spectre) involving speculative execution side channels that affect AMD, ARM, and Intel CPUs to varying degrees. This vulnerability, released on August 6, 2019, is a variant of the Spectre Variant 1 speculative execution side channel vulnerability and has been assigned CVE-2019-1125. Microsoft released a

CVSS3: 5.6
msrc
около 6 лет назад

Windows Kernel Information Disclosure Vulnerability

CVSS3: 5.6
debian
около 6 лет назад

An information disclosure vulnerability exists when certain central pr ...

EPSS

Процентиль: 94%
0.13431
Средний

5.5 Medium

CVSS3

4.6 Medium

CVSS2