cnvd-2018-15496
Vulnerability from cnvd

Title: Intel CPU Foreshadow(预兆)漏洞

Description:

L1终端故障(SGX)漏洞主要存在支持Intel SGX(软件保护扩展)技术的型号CPU中,漏洞命名为:Foreshadow(预兆),利用推测执行侧信道攻击,具有本地用户访问权限的攻击者可以实现未经授权读取到L1缓存中的数据,从而触发信息泄露效果,可能导致独立主机和云平台主机内存信息被未经授权读取。

Severity:

Patch Name: Intel CPU Foreshadow(预兆)漏洞的补丁

Patch Description:

L1终端故障(SGX)漏洞主要存在支持Intel SGX(软件保护扩展)技术的型号CPU中,漏洞命名为:Foreshadow(预兆),利用推测执行侧信道攻击,具有本地用户访问权限的攻击者可以实现未经授权读取到L1缓存中的数据,从而触发信息泄露效果,可能导致独立主机和云平台主机内存信息被未经授权读取。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。

Formal description:

用户可联系供应商获得补丁信息: https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault

Reference: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html

Impacted products
Name
['Intel 8th generation Intel® Core™ processors', 'Intel 7th generation Intel® Core™ processors', 'Intel 6th generation Intel® Core™ processors', 'Intel Intel® Xeon® Processor E3 v5 Family', 'Intel Intel® Xeon® Processor E3 v6 Family']
Show details on source website


{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2018-3615"
    }
  },
  "description": "L1\u7ec8\u7aef\u6545\u969c\uff08SGX\uff09\u6f0f\u6d1e\u4e3b\u8981\u5b58\u5728\u652f\u6301Intel SGX\uff08\u8f6f\u4ef6\u4fdd\u62a4\u6269\u5c55\uff09\u6280\u672f\u7684\u578b\u53f7CPU\u4e2d\uff0c\u6f0f\u6d1e\u547d\u540d\u4e3a\uff1aForeshadow\uff08\u9884\u5146\uff09\uff0c\u5229\u7528\u63a8\u6d4b\u6267\u884c\u4fa7\u4fe1\u9053\u653b\u51fb\uff0c\u5177\u6709\u672c\u5730\u7528\u6237\u8bbf\u95ee\u6743\u9650\u7684\u653b\u51fb\u8005\u53ef\u4ee5\u5b9e\u73b0\u672a\u7ecf\u6388\u6743\u8bfb\u53d6\u5230L1\u7f13\u5b58\u4e2d\u7684\u6570\u636e\uff0c\u4ece\u800c\u89e6\u53d1\u4fe1\u606f\u6cc4\u9732\u6548\u679c\uff0c\u53ef\u80fd\u5bfc\u81f4\u72ec\u7acb\u4e3b\u673a\u548c\u4e91\u5e73\u53f0\u4e3b\u673a\u5185\u5b58\u4fe1\u606f\u88ab\u672a\u7ecf\u6388\u6743\u8bfb\u53d6\u3002",
  "discovererName": "Intel",
  "formalWay": "\u7528\u6237\u53ef\u8054\u7cfb\u4f9b\u5e94\u5546\u83b7\u5f97\u8865\u4e01\u4fe1\u606f\uff1a\r\nhttps://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2018-15496",
  "openTime": "2018-08-16",
  "patchDescription": "L1\u7ec8\u7aef\u6545\u969c\uff08SGX\uff09\u6f0f\u6d1e\u4e3b\u8981\u5b58\u5728\u652f\u6301Intel SGX\uff08\u8f6f\u4ef6\u4fdd\u62a4\u6269\u5c55\uff09\u6280\u672f\u7684\u578b\u53f7CPU\u4e2d\uff0c\u6f0f\u6d1e\u547d\u540d\u4e3a\uff1aForeshadow\uff08\u9884\u5146\uff09\uff0c\u5229\u7528\u63a8\u6d4b\u6267\u884c\u4fa7\u4fe1\u9053\u653b\u51fb\uff0c\u5177\u6709\u672c\u5730\u7528\u6237\u8bbf\u95ee\u6743\u9650\u7684\u653b\u51fb\u8005\u53ef\u4ee5\u5b9e\u73b0\u672a\u7ecf\u6388\u6743\u8bfb\u53d6\u5230L1\u7f13\u5b58\u4e2d\u7684\u6570\u636e\uff0c\u4ece\u800c\u89e6\u53d1\u4fe1\u606f\u6cc4\u9732\u6548\u679c\uff0c\u53ef\u80fd\u5bfc\u81f4\u72ec\u7acb\u4e3b\u673a\u548c\u4e91\u5e73\u53f0\u4e3b\u673a\u5185\u5b58\u4fe1\u606f\u88ab\u672a\u7ecf\u6388\u6743\u8bfb\u53d6\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "Intel CPU Foreshadow\uff08\u9884\u5146\uff09\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": [
      "Intel 8th generation Intel\u00ae Core\u2122 processors",
      "Intel 7th generation Intel\u00ae Core\u2122 processors",
      "Intel 6th generation Intel\u00ae Core\u2122 processors",
      "Intel Intel\u00ae Xeon\u00ae Processor E3 v5 Family",
      "Intel Intel\u00ae Xeon\u00ae Processor E3 v6 Family"
    ]
  },
  "referenceLink": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html",
  "serverity": "\u4e2d",
  "submitTime": "2018-08-16",
  "title": "Intel CPU Foreshadow\uff08\u9884\u5146\uff09\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…