Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2019-04636

Опубликовано: 09 июл. 2019
Источник: fstec
CVSS3: 5.5
CVSS2: 4.6
EPSS Средний

Описание

Уязвимость операционных систем Windows и Linux связана с отсутствием защиты служебных данных. Эксплуатация уязвимости может позволить нарушителю раскрыть защищаемую информацию с помощью специально созданного приложения

Вендор

Microsoft Corp.
Red Hat Inc.
Сообщество свободного программного обеспечения
ООО «РусБИТех-Астра»
АО «Концерн ВНИИНС»

Наименование ПО

Windows
Red Hat Enterprise Linux
Debian GNU/Linux
Red Hat Enterprise MRG Realtime
Astra Linux Special Edition
ОС ОН «Стрелец»
Linux

Версия ПО

Server 2008 R2 SP1 (Windows)
7 SP1 (Windows)
Server 2008 SP2 (Windows)
7 SP1 (Windows)
8.1 (Windows)
8.1 (Windows)
Server 2008 SP2 (Windows)
Server 2012 (Windows)
Server 2012 R2 (Windows)
8.1 RT (Windows)
Workstation 7 (Red Hat Enterprise Linux)
Workstation 7 (Red Hat Enterprise Linux)
Server 7 (Red Hat Enterprise Linux)
Server 7 (Red Hat Enterprise Linux)
Desktop 7 (Red Hat Enterprise Linux)
Desktop 7 (Red Hat Enterprise Linux)
10 (Windows)
10 (Windows)
10 1703 (Windows)
Server 2016 (Windows)
10 1703 (Windows)
Server 2008 SP1 Server Core installation (Windows)
Server 2008 SP2 Server Core installation (Windows)
Server 2008 SP2 Server Core installation (Windows)
Server 2012 R2 Server Core installation (Windows)
Server 2016 Server Core installation (Windows)
Server 2008 R2 SP1 (Windows)
9 (Debian GNU/Linux)
Server 2012 Server Core installation (Windows)
Server 2008 SP2 (Windows)
10 1709 (Windows)
10 1709 (Windows)
2 (Red Hat Enterprise MRG Realtime)
10 1803 (Windows)
10 1803 (Windows)
Server 1803 Server Core Installation (Windows)
10 1809 (Windows)
10 1809 (Windows)
Server 2019 (Windows)
Server 2019 Server Core installation (Windows)
10 1809 (Windows)
10 1709 (Windows)
10 1803 (Windows)
1.6 «Смоленск» (Astra Linux Special Edition)
8.0 (Debian GNU/Linux)
10 1903 (Windows)
10 1903 (Windows)
10 1903 (Windows)
Server 1903 Server Core Installation (Windows)
Server AUS 7.3 (Red Hat Enterprise Linux)
Server AUS 7.3 (Red Hat Enterprise Linux)
Server TUS 7.3 (Red Hat Enterprise Linux)
Server TUS 7.3 (Red Hat Enterprise Linux)
Server AUS 7.2 (Red Hat Enterprise Linux)
Server AUS 7.2 (Red Hat Enterprise Linux)
Server TUS 7.2 (Red Hat Enterprise Linux)
Server AUS 6.5 (Red Hat Enterprise Linux)
Server AUS 7.4 (Red Hat Enterprise Linux)
Server TUS 7.4 (Red Hat Enterprise Linux)
Server AUS 7.7 (Red Hat Enterprise Linux)
Server EUS 7.7 (Red Hat Enterprise Linux)
Server TUS 7.7 (Red Hat Enterprise Linux)
Server TUS 7.2 (Red Hat Enterprise Linux)
Server AUS 6.5 (Red Hat Enterprise Linux)
Server AUS 7.4 (Red Hat Enterprise Linux)
Server TUS 7.4 (Red Hat Enterprise Linux)
Server AUS 7.7 (Red Hat Enterprise Linux)
Server EUS 7.7 (Red Hat Enterprise Linux)
Server TUS 7.7 (Red Hat Enterprise Linux)
до 16.01.2023 (ОС ОН «Стрелец»)
от 4.0 до 4.4.188 включительно (Linux)
от 4.5 до 4.9.305 включительно (Linux)
от 4.10 до 4.14.136 включительно (Linux)
от 4.15 до 4.19.64 включительно (Linux)
от 4.20 до 5.2.6 включительно (Linux)

Тип ПО

Операционная система
Прикладное ПО информационных систем

Операционные системы и аппаратные платформы

Сообщество свободного программного обеспечения Debian GNU/Linux 9
ООО «РусБИТех-Астра» Astra Linux Special Edition 1.6 «Смоленск»
Сообщество свободного программного обеспечения Debian GNU/Linux 8.0
Сообщество свободного программного обеспечения Linux до 5.2.7
АО «Концерн ВНИИНС» ОС ОН «Стрелец» до 16.01.2023

Уровень опасности уязвимости

Средний уровень опасности (базовая оценка CVSS 2.0 составляет 4,6)
Средний уровень опасности (базовая оценка CVSS 3.0 составляет 5,5)

Возможные меры по устранению уязвимости

Использование рекомендаций:
Для Linux:
https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.137
https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.65
https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.189
https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.306
https://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.7
Для Astra Linux:
Обновление программного обеспечения (пакета linux) до 4.15.3-1astra4 или более поздней версии
Для Debian GNU/Linux:
Обновление программного обеспечения (пакета linux) до 4.19.37-5+deb10u2 или более поздней версии
Для программных продуктов Microsoft Corp.:
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1125
Для ОС ОН «Стрелец»:
Обновление программного обеспечения linux до версии 5.4.123-1~bpo10+1.osnova162.strelets

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 94%
0.15102
Средний

5.5 Medium

CVSS3

4.6 Medium

CVSS2

Связанные уязвимости

CVSS3: 5.6
ubuntu
почти 6 лет назад

An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory. An attacker who successfully exploited the vulnerability could read privileged data across trust boundaries. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to elevate user rights directly, but it could be used to obtain information that could be used to try to compromise the affected system further. On January 3, 2018, Microsoft released an advisory and security updates related to a newly-discovered class of hardware vulnerabilities (known as Spectre) involving speculative execution side channels that affect AMD, ARM, and Intel CPUs to varying degrees. This vulnerability, released on August 6, 2019, is a variant of the Spectre Variant 1 speculative execution side channel vulnerability and has been assigned CVE-2019-1125. Microsoft released a...

CVSS3: 5.9
redhat
почти 6 лет назад

An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory. An attacker who successfully exploited the vulnerability could read privileged data across trust boundaries. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to elevate user rights directly, but it could be used to obtain information that could be used to try to compromise the affected system further. On January 3, 2018, Microsoft released an advisory and security updates related to a newly-discovered class of hardware vulnerabilities (known as Spectre) involving speculative execution side channels that affect AMD, ARM, and Intel CPUs to varying degrees. This vulnerability, released on August 6, 2019, is a variant of the Spectre Variant 1 speculative execution side channel vulnerability and has been assigned CVE-2019-1125. Microsoft released...

CVSS3: 5.6
nvd
почти 6 лет назад

An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory. An attacker who successfully exploited the vulnerability could read privileged data across trust boundaries. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to elevate user rights directly, but it could be used to obtain information that could be used to try to compromise the affected system further. On January 3, 2018, Microsoft released an advisory and security updates related to a newly-discovered class of hardware vulnerabilities (known as Spectre) involving speculative execution side channels that affect AMD, ARM, and Intel CPUs to varying degrees. This vulnerability, released on August 6, 2019, is a variant of the Spectre Variant 1 speculative execution side channel vulnerability and has been assigned CVE-2019-1125. Microsoft released a

CVSS3: 5.6
msrc
почти 6 лет назад

Windows Kernel Information Disclosure Vulnerability

CVSS3: 5.6
debian
почти 6 лет назад

An information disclosure vulnerability exists when certain central pr ...

EPSS

Процентиль: 94%
0.15102
Средний

5.5 Medium

CVSS3

4.6 Medium

CVSS2