cnvd-2018-15495
Vulnerability from cnvd
Title: Intel CPU Foreshadow-NG(预兆下一代版本)漏洞
Description:
L1终端故障(OS/SMM)漏洞不同于具备SGX(软件保护扩展)技术的Intel CPU中,其他厂商CPU可能也同样受到影响,利用推测执行侧信道攻击,具有本地用户访问权限的攻击者可以实现未经授权读取到L1缓存中的数据(包括操作系统内核和SMM模式),从而触发信息泄露效果,可能导致操作系统内核信息被越权读取,同时可能绕过针对侧信道攻击早期版本Meltdown(熔断)和Spectre(幽灵)的缓解措施。
Severity: 中
Patch Name: Intel CPU Foreshadow-NG(预兆下一代版本)漏洞的补丁
Patch Description:
L1终端故障(OS/SMM)漏洞不同于具备SGX(软件保护扩展)技术的Intel CPU中,其他厂商CPU可能也同样受到影响,利用推测执行侧信道攻击,具有本地用户访问权限的攻击者可以实现未经授权读取到L1缓存中的数据(包括操作系统内核和SMM模式),从而触发信息泄露效果,可能导致操作系统内核信息被越权读取,同时可能绕过针对侧信道攻击早期版本Meltdown(熔断)和Spectre(幽灵)的缓解措施。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
用户可联系供应商获得补丁信息: https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault
Reference: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html
Name | ['Intel Intel® Xeon® Processor E7 v2 Family', 'Intel Intel® Xeon® Processor E7 v3 Family', 'Intel Intel® Xeon® Processor E7 v4 Family', 'Intel Intel® Xeon® Processor Scalable Family', 'Intel Intel® Xeon® processor 5600 series', 'Intel Intel® Xeon® processor 6500 series', 'Intel Intel® Xeon® processor 7500 series', 'Intel Intel® Xeon® processor 5500 series', 'Intel Intel® Xeon® processor 3600 series', 'Intel Intel® Xeon® Processor E3 Family', 'Intel Intel® Xeon® Processor E3 v2 Family', 'Intel Intel® Xeon® processor 3400 series', 'Intel Intel® Core™ X-series Processor Family for Intel® X299 platforms', 'Intel Intel® Core™ X-series Processor Family for Intel® X99 platforms', 'Intel 5th generation Intel® Core™ processors', 'Intel 4th generation Intel® Core™ processors', 'Intel 3rd generation Intel® Core™ processors', 'Intel Intel® Xeon® Processor E3 v3 Family', 'Intel Intel® Xeon® Processor E3 v4 Family', 'Intel 2nd generation Intel® Core™ processors', 'Intel Intel® Core™ M processor family (45nm and 32nm)', 'Intel Intel® Xeon® Processor E5 Family', 'Intel Intel® Core™ i7 processor (45nm and 32nm)', 'Intel Intel® Xeon® Processor E5 v2 Family', 'Intel Intel® Core™ i5 processor (45nm and 32nm)', 'Intel Intel® Xeon® Processor E5 v3 Family', 'Intel Intel® Core™ i3 processor (45nm and 32nm)', 'Intel Intel® Xeon® Processor E7 Family', 'Intel Intel® Xeon® Processor E5 v4 Family'] |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2018-3620" } }, "description": "L1\u7ec8\u7aef\u6545\u969c\uff08OS/SMM\uff09\u6f0f\u6d1e\u4e0d\u540c\u4e8e\u5177\u5907SGX\uff08\u8f6f\u4ef6\u4fdd\u62a4\u6269\u5c55\uff09\u6280\u672f\u7684Intel CPU\u4e2d\uff0c\u5176\u4ed6\u5382\u5546CPU\u53ef\u80fd\u4e5f\u540c\u6837\u53d7\u5230\u5f71\u54cd\uff0c\u5229\u7528\u63a8\u6d4b\u6267\u884c\u4fa7\u4fe1\u9053\u653b\u51fb\uff0c\u5177\u6709\u672c\u5730\u7528\u6237\u8bbf\u95ee\u6743\u9650\u7684\u653b\u51fb\u8005\u53ef\u4ee5\u5b9e\u73b0\u672a\u7ecf\u6388\u6743\u8bfb\u53d6\u5230L1\u7f13\u5b58\u4e2d\u7684\u6570\u636e\uff08\u5305\u62ec\u64cd\u4f5c\u7cfb\u7edf\u5185\u6838\u548cSMM\u6a21\u5f0f\uff09\uff0c\u4ece\u800c\u89e6\u53d1\u4fe1\u606f\u6cc4\u9732\u6548\u679c\uff0c\u53ef\u80fd\u5bfc\u81f4\u64cd\u4f5c\u7cfb\u7edf\u5185\u6838\u4fe1\u606f\u88ab\u8d8a\u6743\u8bfb\u53d6\uff0c\u540c\u65f6\u53ef\u80fd\u7ed5\u8fc7\u9488\u5bf9\u4fa7\u4fe1\u9053\u653b\u51fb\u65e9\u671f\u7248\u672cMeltdown\uff08\u7194\u65ad\uff09\u548cSpectre\uff08\u5e7d\u7075\uff09\u7684\u7f13\u89e3\u63aa\u65bd\u3002", "discovererName": "Intel", "formalWay": "\u7528\u6237\u53ef\u8054\u7cfb\u4f9b\u5e94\u5546\u83b7\u5f97\u8865\u4e01\u4fe1\u606f\uff1a\r\nhttps://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2018-15495", "openTime": "2018-08-16", "patchDescription": "L1\u7ec8\u7aef\u6545\u969c\uff08OS/SMM\uff09\u6f0f\u6d1e\u4e0d\u540c\u4e8e\u5177\u5907SGX\uff08\u8f6f\u4ef6\u4fdd\u62a4\u6269\u5c55\uff09\u6280\u672f\u7684Intel CPU\u4e2d\uff0c\u5176\u4ed6\u5382\u5546CPU\u53ef\u80fd\u4e5f\u540c\u6837\u53d7\u5230\u5f71\u54cd\uff0c\u5229\u7528\u63a8\u6d4b\u6267\u884c\u4fa7\u4fe1\u9053\u653b\u51fb\uff0c\u5177\u6709\u672c\u5730\u7528\u6237\u8bbf\u95ee\u6743\u9650\u7684\u653b\u51fb\u8005\u53ef\u4ee5\u5b9e\u73b0\u672a\u7ecf\u6388\u6743\u8bfb\u53d6\u5230L1\u7f13\u5b58\u4e2d\u7684\u6570\u636e\uff08\u5305\u62ec\u64cd\u4f5c\u7cfb\u7edf\u5185\u6838\u548cSMM\u6a21\u5f0f\uff09\uff0c\u4ece\u800c\u89e6\u53d1\u4fe1\u606f\u6cc4\u9732\u6548\u679c\uff0c\u53ef\u80fd\u5bfc\u81f4\u64cd\u4f5c\u7cfb\u7edf\u5185\u6838\u4fe1\u606f\u88ab\u8d8a\u6743\u8bfb\u53d6\uff0c\u540c\u65f6\u53ef\u80fd\u7ed5\u8fc7\u9488\u5bf9\u4fa7\u4fe1\u9053\u653b\u51fb\u65e9\u671f\u7248\u672cMeltdown\uff08\u7194\u65ad\uff09\u548cSpectre\uff08\u5e7d\u7075\uff09\u7684\u7f13\u89e3\u63aa\u65bd\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "Intel CPU Foreshadow-NG\uff08\u9884\u5146\u4e0b\u4e00\u4ee3\u7248\u672c\uff09\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": [ "Intel Intel\u00ae Xeon\u00ae Processor E7 v2 Family", "Intel Intel\u00ae Xeon\u00ae Processor E7 v3 Family", "Intel Intel\u00ae Xeon\u00ae Processor E7 v4 Family", "Intel Intel\u00ae Xeon\u00ae Processor Scalable Family", "Intel Intel\u00ae Xeon\u00ae processor 5600 series", "Intel Intel\u00ae Xeon\u00ae processor 6500 series", "Intel Intel\u00ae Xeon\u00ae processor 7500 series", "Intel Intel\u00ae Xeon\u00ae processor 5500 series", "Intel Intel\u00ae Xeon\u00ae processor 3600 series", "Intel Intel\u00ae Xeon\u00ae Processor E3 Family", "Intel Intel\u00ae Xeon\u00ae Processor E3 v2 Family", "Intel Intel\u00ae Xeon\u00ae processor 3400 series", "Intel Intel\u00ae Core\u2122 X-series Processor Family for Intel\u00ae X299 platforms", "Intel Intel\u00ae Core\u2122 X-series Processor Family for Intel\u00ae X99 platforms", "Intel 5th generation Intel\u00ae Core\u2122 processors", "Intel 4th generation Intel\u00ae Core\u2122 processors", "Intel 3rd generation Intel\u00ae Core\u2122 processors", "Intel Intel\u00ae Xeon\u00ae Processor E3 v3 Family", "Intel Intel\u00ae Xeon\u00ae Processor E3 v4 Family", "Intel 2nd generation Intel\u00ae Core\u2122 processors", "Intel Intel\u00ae Core\u2122 M processor family (45nm and 32nm)", "Intel Intel\u00ae Xeon\u00ae Processor E5 Family", "Intel Intel\u00ae Core\u2122 i7 processor (45nm and 32nm)", "Intel Intel\u00ae Xeon\u00ae Processor E5 v2 Family", "Intel Intel\u00ae Core\u2122 i5 processor (45nm and 32nm)", "Intel Intel\u00ae Xeon\u00ae Processor E5 v3 Family", "Intel Intel\u00ae Core\u2122 i3 processor (45nm and 32nm)", "Intel Intel\u00ae Xeon\u00ae Processor E7 Family", "Intel Intel\u00ae Xeon\u00ae Processor E5 v4 Family" ] }, "referenceLink": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html", "serverity": "\u4e2d", "submitTime": "2018-08-16", "title": "Intel CPU Foreshadow-NG\uff08\u9884\u5146\u4e0b\u4e00\u4ee3\u7248\u672c\uff09\u6f0f\u6d1e" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.