Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-5753

Опубликовано: 03 янв. 2018
Источник: redhat
CVSS3: 5.5
EPSS Критический

Описание

Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks.

Отчет

Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/speculativeexecution

Дополнительная информация

Статус:

Important
Дефект:
CWE-226->CWE-385->CWE-200
https://bugzilla.redhat.com/show_bug.cgi?id=1519778hw: cpu: speculative execution bounds-check bypass

EPSS

Процентиль: 100%
0.94332
Критический

5.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.6
ubuntu
больше 7 лет назад

Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

CVSS3: 5.6
nvd
больше 7 лет назад

Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

CVSS3: 5.6
debian
больше 7 лет назад

Systems with microprocessors utilizing speculative execution and branc ...

suse-cvrf
почти 4 года назад

Security update for spectre-meltdown-checker

suse-cvrf
почти 4 года назад

Security update for spectre-meltdown-checker

EPSS

Процентиль: 100%
0.94332
Критический

5.5 Medium

CVSS3

Уязвимость CVE-2017-5753