cnvd-2018-13356
Vulnerability from cnvd
Title: 多款CPU Hardwares信息泄露漏洞
Description:
CPU hardware是运行在中央处理器中用于管理和控制CPU的固件。
多款CPU Hardwares存在信息泄露漏洞。该漏洞产生的原因是CPU高速缓存处理存在竞争条件。本地攻击者可以利用漏洞通过侧信道分析获取敏感信息。
Severity: 中
Patch Name: 多款CPU Hardwares信息泄露漏洞的补丁
Patch Description:
CPU hardware是运行在中央处理器中用于管理和控制CPU的固件。
多款CPU Hardwares存在信息泄露漏洞。该漏洞产生的原因是CPU高速缓存处理存在竞争条件。本地攻击者可以利用漏洞通过侧信道分析获取敏感信息。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
厂商已发布漏洞修复程序,请及时关注更新: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html
Reference: https://securitytracker.com/id/1040949
Impacted products
Name | ['ARM Cortex A57', 'Intel 5th generation Core Processors 无', 'ARM Cortex A72', 'Intel 6th generation Core processors 0', 'Intel 5th generation Core processors 0', 'Intel 4th generation Core processors 0', 'Intel 3rd generation Core processors 0', 'Intel 2nd generation Core processors 0', 'Intel 8th generation Core processors 0', 'Intel 7th generation Core processors 0', 'Intel Atom Processor A Series 0', 'Intel Atom Processor C Series 0', 'Intel Atom Processor E Series 0', 'Intel Atom Processor T Series 0', 'Intel Atom Processor X Series 0', 'Intel Atom Processor Z Series 0', 'Intel Core X-series Processor Family for Intel X99 platforms 0', 'Intel Celeron Processor J Series 0', 'Intel Celeron Processor N Series 0', 'Intel Core M processor family 0', 'Intel Core X-series Processor Family for Intel X299 platforms 0', 'Intel Pentium Processor N Series 0', 'Intel Pentium Processor Silver Series 0', 'Intel Xeon processor 3400 series 0', 'Intel Xeon processor 3600 series 0', 'Intel Xeon processor 5500 series 0', 'Intel Xeon processor 5600 series 0', 'Intel Xeon processor 7500 series 0', 'Intel Xeon processor 6500 series 0', 'Intel Pentium Processor J Series 0', 'Intel Xeon Processor E3 Family 0', 'Intel Xeon Processor E3 v2 Family 0', 'Intel Xeon Processor E3 v3 Family 0', 'Intel Xeon Processor E3 v4 Family 0', 'Intel Xeon Processor E3 v5 Family 0', 'Intel Xeon Processor E3 v6 Family 0', 'Intel Xeon Processor E5 Family 0', 'Intel Xeon Processor E5 v2 Family 0', 'Intel Xeon Processor E5 v3 Family 0', 'Intel Xeon Processor E5 v4 Family 0', 'Intel Xeon Processor E7 Family 0', 'Intel Xeon Processor E7 v2 Family 0', 'Intel Xeon Processor E7 v3 Family 0', 'Intel Xeon Processor E7 v4 Family 0'] |
---|
{ "bids": { "bid": { "bidNumber": "104228" } }, "cves": { "cve": { "cveNumber": "CVE-2018-3640" } }, "description": "CPU hardware\u662f\u8fd0\u884c\u5728\u4e2d\u592e\u5904\u7406\u5668\u4e2d\u7528\u4e8e\u7ba1\u7406\u548c\u63a7\u5236CPU\u7684\u56fa\u4ef6\u3002\r\n\r\n\u591a\u6b3eCPU Hardwares\u5b58\u5728\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u4ea7\u751f\u7684\u539f\u56e0\u662fCPU\u9ad8\u901f\u7f13\u5b58\u5904\u7406\u5b58\u5728\u7ade\u4e89\u6761\u4ef6\u3002\u672c\u5730\u653b\u51fb\u8005\u53ef\u4ee5\u5229\u7528\u6f0f\u6d1e\u901a\u8fc7\u4fa7\u4fe1\u9053\u5206\u6790\u83b7\u53d6\u654f\u611f\u4fe1\u606f\u3002", "discovererName": "Jann Horn (Google Project Zero), Werner Haas, Thomas Prescher (Cyberus Technology), Zdenek Sojka, Innokentiy Sennovskiy from BiZone LLC, Rudolf Marek and Alex Zuepke from SYSGO AG", "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2018-13356", "openTime": "2018-07-18", "patchDescription": "CPU hardware\u662f\u8fd0\u884c\u5728\u4e2d\u592e\u5904\u7406\u5668\u4e2d\u7528\u4e8e\u7ba1\u7406\u548c\u63a7\u5236CPU\u7684\u56fa\u4ef6\u3002\r\n\r\n\u591a\u6b3eCPU Hardwares\u5b58\u5728\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u4ea7\u751f\u7684\u539f\u56e0\u662fCPU\u9ad8\u901f\u7f13\u5b58\u5904\u7406\u5b58\u5728\u7ade\u4e89\u6761\u4ef6\u3002\u672c\u5730\u653b\u51fb\u8005\u53ef\u4ee5\u5229\u7528\u6f0f\u6d1e\u901a\u8fc7\u4fa7\u4fe1\u9053\u5206\u6790\u83b7\u53d6\u654f\u611f\u4fe1\u606f\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "\u591a\u6b3eCPU Hardwares\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": [ "ARM Cortex A57", "Intel 5th generation Core Processors \u65e0", "ARM Cortex A72", "Intel 6th generation Core processors 0", "Intel 5th generation Core processors 0", "Intel 4th generation Core processors 0", "Intel 3rd generation Core processors 0", "Intel 2nd generation Core processors 0", "Intel 8th generation Core processors 0", "Intel 7th generation Core processors 0", "Intel Atom Processor A Series 0", "Intel Atom Processor C Series 0", "Intel Atom Processor E Series 0", "Intel Atom Processor T Series 0", "Intel Atom Processor X Series 0", "Intel Atom Processor Z Series 0", "Intel Core X-series Processor Family for Intel X99 platforms 0", "Intel Celeron Processor J Series 0", "Intel Celeron Processor N Series 0", "Intel Core M processor family 0", "Intel Core X-series Processor Family for Intel X299 platforms 0", "Intel Pentium Processor N Series 0", "Intel Pentium Processor Silver Series 0", "Intel Xeon processor 3400 series 0", "Intel Xeon processor 3600 series 0", "Intel Xeon processor 5500 series 0", "Intel Xeon processor 5600 series 0", "Intel Xeon processor 7500 series 0", "Intel Xeon processor 6500 series 0", "Intel Pentium Processor J Series 0", "Intel Xeon Processor E3 Family 0", "Intel Xeon Processor E3 v2 Family 0", "Intel Xeon Processor E3 v3 Family 0", "Intel Xeon Processor E3 v4 Family 0", "Intel Xeon Processor E3 v5 Family 0", "Intel Xeon Processor E3 v6 Family 0", "Intel Xeon Processor E5 Family 0", "Intel Xeon Processor E5 v2 Family 0", "Intel Xeon Processor E5 v3 Family 0", "Intel Xeon Processor E5 v4 Family 0", "Intel Xeon Processor E7 Family 0", "Intel Xeon Processor E7 v2 Family 0", "Intel Xeon Processor E7 v3 Family 0", "Intel Xeon Processor E7 v4 Family 0" ] }, "referenceLink": "https://securitytracker.com/id/1040949", "serverity": "\u4e2d", "submitTime": "2018-05-22", "title": "\u591a\u6b3eCPU Hardwares\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…