Описание
Microsoft Guidance for Lazy FP State Restore
Executive summary
On January 3, 2018, Microsoft released an advisory and security updates related to a newly-discovered class of hardware vulnerabilities (known as Spectre and Meltdown) involving speculative execution side channels that affect AMD, ARM, and Intel CPUs to varying degrees. On June 13, 2018, an additional vulnerability involving side channel speculative execution, known as Lazy FP State Restore, has been announced and assigned CVE-2018-3665.
An attacker, via a local process, could cause information stored in FP (Floating Point), MMX, and SSE register state to be disclosed across security boundaries on Intel Core family CPUs through speculative execution. An attacker must be able to execute code locally on a system in order to exploit this vulnerability, similar to the other speculative execution vulnerabilities. The information that could be disclosed in the register state depends on the code executing on a system and whether any code stores sensitive information in FP register state.
The security boundaries that may be affected by this vulnerability include virtual machine, kernel, and process.
Recommended actions
- Register for security notifications mailer to be alerted of content changes to this advisory. See Microsoft Technical Security Notifications.
- Review https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00145.html
- Apply security updates.
FAQ
1. Is lazy restore enabled by default and can it be disabled?
In affected versions of Windows (see the Affected Products table), lazy restore is enabled by default and cannot be disabled by the user or administrator.
2. Are VMs in Azure affected?
Customers running VMs in Azure are not at risk from this variant. No action is required.
3. What is the CVSS value for this vulnerability?
CVSS - 4.3 Medium CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
Обновления
Продукт | Статья | Обновление |
---|---|---|
Windows Server 2008 for 32-bit Systems Service Pack 2 | ||
Windows 7 for 32-bit Systems Service Pack 1 | ||
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | ||
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | ||
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | ||
Windows Server 2012 | ||
Windows Server 2012 (Server Core installation) | ||
Windows 8.1 for x64-based systems | ||
Windows Server 2012 R2 | ||
Windows Server 2012 R2 (Server Core installation) |
Показывать по
Возможность эксплуатации
Publicly Disclosed
Exploited
Latest Software Release
Older Software Release