cnvd-2018-15494
Vulnerability from cnvd
Title: Intel CPU Foreshadow-NG(预兆下一代版本)漏洞(CNVD-2018-15494)
Description:
L1终端故障VMM漏洞和CVE-2018-3620一样,属于Foreshadow-NG(预兆下一代版本),同样,其他厂商CPU可能也受到影响,利用推测执行侧信道攻击,具有本地用户访问权限的攻击者可以实现未经授权读取到L1缓存中的数据(包括虚拟主机),从而触发信息泄露效果,可能导致云平台虚拟主机内存信息被未经授权越权读取,同时,针对侧信道攻击早期版本Meltdown(熔断)和Spectre(幽灵)的缓解措施可能对其无效。
Severity: 中
Patch Name: Intel CPU Foreshadow-NG(预兆下一代版本)漏洞(CNVD-2018-15494)的补丁
Patch Description:
L1终端故障VMM漏洞和CVE-2018-3620一样,属于Foreshadow-NG(预兆下一代版本),同样,其他厂商CPU可能也受到影响,利用推测执行侧信道攻击,具有本地用户访问权限的攻击者可以实现未经授权读取到L1缓存中的数据(包括虚拟主机),从而触发信息泄露效果,可能导致云平台虚拟主机内存信息被未经授权越权读取,同时,针对侧信道攻击早期版本Meltdown(熔断)和Spectre(幽灵)的缓解措施可能对其无效。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
用户可联系供应商获得补丁信息: https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault
Reference: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html
Name | ['Intel Intel® Xeon® Processor E7 v2 Family', 'Intel Intel® Xeon® Processor E7 v3 Family', 'Intel Intel® Xeon® Processor E7 v4 Family', 'Intel Intel® Xeon® Processor Scalable Family', 'Intel Intel® Xeon® processor 5600 series', 'Intel Intel® Xeon® processor 6500 series', 'Intel Intel® Xeon® processor 7500 series', 'Intel Intel® Xeon® processor 5500 series', 'Intel Intel® Xeon® processor 3600 series', 'Intel Intel® Xeon® Processor E3 Family', 'Intel Intel® Xeon® Processor E3 v2 Family', 'Intel Intel® Xeon® processor 3400 series', 'Intel Intel® Core™ X-series Processor Family for Intel® X299 platforms', 'Intel Intel® Core™ X-series Processor Family for Intel® X99 platforms', 'Intel 5th generation Intel® Core™ processors', 'Intel 4th generation Intel® Core™ processors', 'Intel 3rd generation Intel® Core™ processors', 'Intel Intel® Xeon® Processor E3 v3 Family', 'Intel Intel® Xeon® Processor E3 v4 Family', 'Intel 2nd generation Intel® Core™ processors', 'Intel Intel® Core™ M processor family (45nm and 32nm)', 'Intel Intel® Xeon® Processor E5 Family', 'Intel Intel® Core™ i7 processor (45nm and 32nm)', 'Intel Intel® Xeon® Processor E5 v2 Family', 'Intel Intel® Core™ i5 processor (45nm and 32nm)', 'Intel Intel® Xeon® Processor E5 v3 Family', 'Intel Intel® Core™ i3 processor (45nm and 32nm)', 'Intel Intel® Xeon® Processor E7 Family', 'Intel Intel® Xeon® Processor E5 v4 Family'] |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2018-3646" } }, "description": "L1\u7ec8\u7aef\u6545\u969cVMM\u6f0f\u6d1e\u548cCVE-2018-3620\u4e00\u6837\uff0c\u5c5e\u4e8eForeshadow-NG\uff08\u9884\u5146\u4e0b\u4e00\u4ee3\u7248\u672c\uff09\uff0c\u540c\u6837\uff0c\u5176\u4ed6\u5382\u5546CPU\u53ef\u80fd\u4e5f\u53d7\u5230\u5f71\u54cd\uff0c\u5229\u7528\u63a8\u6d4b\u6267\u884c\u4fa7\u4fe1\u9053\u653b\u51fb\uff0c\u5177\u6709\u672c\u5730\u7528\u6237\u8bbf\u95ee\u6743\u9650\u7684\u653b\u51fb\u8005\u53ef\u4ee5\u5b9e\u73b0\u672a\u7ecf\u6388\u6743\u8bfb\u53d6\u5230L1\u7f13\u5b58\u4e2d\u7684\u6570\u636e\uff08\u5305\u62ec\u865a\u62df\u4e3b\u673a\uff09\uff0c\u4ece\u800c\u89e6\u53d1\u4fe1\u606f\u6cc4\u9732\u6548\u679c\uff0c\u53ef\u80fd\u5bfc\u81f4\u4e91\u5e73\u53f0\u865a\u62df\u4e3b\u673a\u5185\u5b58\u4fe1\u606f\u88ab\u672a\u7ecf\u6388\u6743\u8d8a\u6743\u8bfb\u53d6\uff0c\u540c\u65f6\uff0c\u9488\u5bf9\u4fa7\u4fe1\u9053\u653b\u51fb\u65e9\u671f\u7248\u672cMeltdown\uff08\u7194\u65ad\uff09\u548cSpectre\uff08\u5e7d\u7075\uff09\u7684\u7f13\u89e3\u63aa\u65bd\u53ef\u80fd\u5bf9\u5176\u65e0\u6548\u3002", "discovererName": "Intel", "formalWay": "\u7528\u6237\u53ef\u8054\u7cfb\u4f9b\u5e94\u5546\u83b7\u5f97\u8865\u4e01\u4fe1\u606f\uff1a\r\nhttps://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2018-15494", "openTime": "2018-08-16", "patchDescription": "L1\u7ec8\u7aef\u6545\u969cVMM\u6f0f\u6d1e\u548cCVE-2018-3620\u4e00\u6837\uff0c\u5c5e\u4e8eForeshadow-NG\uff08\u9884\u5146\u4e0b\u4e00\u4ee3\u7248\u672c\uff09\uff0c\u540c\u6837\uff0c\u5176\u4ed6\u5382\u5546CPU\u53ef\u80fd\u4e5f\u53d7\u5230\u5f71\u54cd\uff0c\u5229\u7528\u63a8\u6d4b\u6267\u884c\u4fa7\u4fe1\u9053\u653b\u51fb\uff0c\u5177\u6709\u672c\u5730\u7528\u6237\u8bbf\u95ee\u6743\u9650\u7684\u653b\u51fb\u8005\u53ef\u4ee5\u5b9e\u73b0\u672a\u7ecf\u6388\u6743\u8bfb\u53d6\u5230L1\u7f13\u5b58\u4e2d\u7684\u6570\u636e\uff08\u5305\u62ec\u865a\u62df\u4e3b\u673a\uff09\uff0c\u4ece\u800c\u89e6\u53d1\u4fe1\u606f\u6cc4\u9732\u6548\u679c\uff0c\u53ef\u80fd\u5bfc\u81f4\u4e91\u5e73\u53f0\u865a\u62df\u4e3b\u673a\u5185\u5b58\u4fe1\u606f\u88ab\u672a\u7ecf\u6388\u6743\u8d8a\u6743\u8bfb\u53d6\uff0c\u540c\u65f6\uff0c\u9488\u5bf9\u4fa7\u4fe1\u9053\u653b\u51fb\u65e9\u671f\u7248\u672cMeltdown\uff08\u7194\u65ad\uff09\u548cSpectre\uff08\u5e7d\u7075\uff09\u7684\u7f13\u89e3\u63aa\u65bd\u53ef\u80fd\u5bf9\u5176\u65e0\u6548\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "Intel CPU Foreshadow-NG\uff08\u9884\u5146\u4e0b\u4e00\u4ee3\u7248\u672c\uff09\u6f0f\u6d1e\uff08CNVD-2018-15494\uff09\u7684\u8865\u4e01", "products": { "product": [ "Intel Intel\u00ae Xeon\u00ae Processor E7 v2 Family", "Intel Intel\u00ae Xeon\u00ae Processor E7 v3 Family", "Intel Intel\u00ae Xeon\u00ae Processor E7 v4 Family", "Intel Intel\u00ae Xeon\u00ae Processor Scalable Family", "Intel Intel\u00ae Xeon\u00ae processor 5600 series", "Intel Intel\u00ae Xeon\u00ae processor 6500 series", "Intel Intel\u00ae Xeon\u00ae processor 7500 series", "Intel Intel\u00ae Xeon\u00ae processor 5500 series", "Intel Intel\u00ae Xeon\u00ae processor 3600 series", "Intel Intel\u00ae Xeon\u00ae Processor E3 Family", "Intel Intel\u00ae Xeon\u00ae Processor E3 v2 Family", "Intel Intel\u00ae Xeon\u00ae processor 3400 series", "Intel Intel\u00ae Core\u2122 X-series Processor Family for Intel\u00ae X299 platforms", "Intel Intel\u00ae Core\u2122 X-series Processor Family for Intel\u00ae X99 platforms", "Intel 5th generation Intel\u00ae Core\u2122 processors", "Intel 4th generation Intel\u00ae Core\u2122 processors", "Intel 3rd generation Intel\u00ae Core\u2122 processors", "Intel Intel\u00ae Xeon\u00ae Processor E3 v3 Family", "Intel Intel\u00ae Xeon\u00ae Processor E3 v4 Family", "Intel 2nd generation Intel\u00ae Core\u2122 processors", "Intel Intel\u00ae Core\u2122 M processor family (45nm and 32nm)", "Intel Intel\u00ae Xeon\u00ae Processor E5 Family", "Intel Intel\u00ae Core\u2122 i7 processor (45nm and 32nm)", "Intel Intel\u00ae Xeon\u00ae Processor E5 v2 Family", "Intel Intel\u00ae Core\u2122 i5 processor (45nm and 32nm)", "Intel Intel\u00ae Xeon\u00ae Processor E5 v3 Family", "Intel Intel\u00ae Core\u2122 i3 processor (45nm and 32nm)", "Intel Intel\u00ae Xeon\u00ae Processor E7 Family", "Intel Intel\u00ae Xeon\u00ae Processor E5 v4 Family" ] }, "referenceLink": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html", "serverity": "\u4e2d", "submitTime": "2018-08-16", "title": "Intel CPU Foreshadow-NG\uff08\u9884\u5146\u4e0b\u4e00\u4ee3\u7248\u672c\uff09\u6f0f\u6d1e\uff08CNVD-2018-15494\uff09" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.