Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-23583

Опубликовано: 14 нояб. 2023
Источник: redhat
CVSS3: 8.8
EPSS Низкий

Описание

Sequence of processor instructions leads to unexpected behavior for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege and/or information disclosure and/or denial of service via local access.

A security vulnerability was found in some Intel processors. Execution of REP MOVSB instructions with a redundant REX prefix may result in execution continuing at an incorrect EIP address after a micro-architectural event occurs, potentially allowing privilege escalation, information disclosure and/or a denial of service via local access.

Отчет

This is a hardware flaw that affects select Intel processors and is not a Red Hat Enterprise Linux defect/vulnerability - no Red Hat products are affected by this CVE. Red Hat has very limited to no visibility and control over binary blobs provided by third-party vendors. Red Hat relies heavily on the vendors to provide timely updates and information about included changes for this content. In most cases, it merely acts as a release vehicle between the third-party vendor and Red Hat customers with no possibility of influencing or even documenting the changes. Unless explicitly stated, the level of insight, oversight, and control Red Hat has does not meet the criteria required (in terms of Red Hat-owned development processes and QA documentation) for releasing this content as RHSA. For more information, please contact the binary content vendor. For microcode availability, check the Red Hat article at https://access.redhat.com/articles/7044453

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6microcode_ctlNot affected
Red Hat Enterprise Linux 7microcode_ctlNot affected
Red Hat Enterprise Linux 8microcode_ctlNot affected
Red Hat Enterprise Linux 9microcode_ctlNot affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-1281
https://bugzilla.redhat.com/show_bug.cgi?id=2239097hw: Intel: execution of MOVSB instructions with redundant REX prefix leads to unintended system behavior

EPSS

Процентиль: 9%
0.00035
Низкий

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
ubuntu
больше 1 года назад

Sequence of processor instructions leads to unexpected behavior for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege and/or information disclosure and/or denial of service via local access.

CVSS3: 8.8
nvd
больше 1 года назад

Sequence of processor instructions leads to unexpected behavior for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege and/or information disclosure and/or denial of service via local access.

CVSS3: 8.8
debian
больше 1 года назад

Sequence of processor instructions leads to unexpected behavior for so ...

suse-cvrf
больше 1 года назад

Security update for ucode-intel

suse-cvrf
больше 1 года назад

Security update for ucode-intel

EPSS

Процентиль: 9%
0.00035
Низкий

8.8 High

CVSS3