CNVD-2018-15496

Vulnerability from cnvd - Published: 2018-08-16
VLAI Severity ?
Title
Intel CPU Foreshadow(预兆)漏洞
Description
L1终端故障(SGX)漏洞主要存在支持Intel SGX(软件保护扩展)技术的型号CPU中,漏洞命名为:Foreshadow(预兆),利用推测执行侧信道攻击,具有本地用户访问权限的攻击者可以实现未经授权读取到L1缓存中的数据,从而触发信息泄露效果,可能导致独立主机和云平台主机内存信息被未经授权读取。
Severity
Patch Name
Intel CPU Foreshadow(预兆)漏洞的补丁
Patch Description
L1终端故障(SGX)漏洞主要存在支持Intel SGX(软件保护扩展)技术的型号CPU中,漏洞命名为:Foreshadow(预兆),利用推测执行侧信道攻击,具有本地用户访问权限的攻击者可以实现未经授权读取到L1缓存中的数据,从而触发信息泄露效果,可能导致独立主机和云平台主机内存信息被未经授权读取。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

用户可联系供应商获得补丁信息: https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault

Reference
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html
Impacted products
Name
['Intel 8th generation Intel® Core™ processors', 'Intel 7th generation Intel® Core™ processors', 'Intel 6th generation Intel® Core™ processors', 'Intel Intel® Xeon® Processor E3 v5 Family', 'Intel Intel® Xeon® Processor E3 v6 Family']
Show details on source website

{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2018-3615"
    }
  },
  "description": "L1\u7ec8\u7aef\u6545\u969c\uff08SGX\uff09\u6f0f\u6d1e\u4e3b\u8981\u5b58\u5728\u652f\u6301Intel SGX\uff08\u8f6f\u4ef6\u4fdd\u62a4\u6269\u5c55\uff09\u6280\u672f\u7684\u578b\u53f7CPU\u4e2d\uff0c\u6f0f\u6d1e\u547d\u540d\u4e3a\uff1aForeshadow\uff08\u9884\u5146\uff09\uff0c\u5229\u7528\u63a8\u6d4b\u6267\u884c\u4fa7\u4fe1\u9053\u653b\u51fb\uff0c\u5177\u6709\u672c\u5730\u7528\u6237\u8bbf\u95ee\u6743\u9650\u7684\u653b\u51fb\u8005\u53ef\u4ee5\u5b9e\u73b0\u672a\u7ecf\u6388\u6743\u8bfb\u53d6\u5230L1\u7f13\u5b58\u4e2d\u7684\u6570\u636e\uff0c\u4ece\u800c\u89e6\u53d1\u4fe1\u606f\u6cc4\u9732\u6548\u679c\uff0c\u53ef\u80fd\u5bfc\u81f4\u72ec\u7acb\u4e3b\u673a\u548c\u4e91\u5e73\u53f0\u4e3b\u673a\u5185\u5b58\u4fe1\u606f\u88ab\u672a\u7ecf\u6388\u6743\u8bfb\u53d6\u3002",
  "discovererName": "Intel",
  "formalWay": "\u7528\u6237\u53ef\u8054\u7cfb\u4f9b\u5e94\u5546\u83b7\u5f97\u8865\u4e01\u4fe1\u606f\uff1a\r\nhttps://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2018-15496",
  "openTime": "2018-08-16",
  "patchDescription": "L1\u7ec8\u7aef\u6545\u969c\uff08SGX\uff09\u6f0f\u6d1e\u4e3b\u8981\u5b58\u5728\u652f\u6301Intel SGX\uff08\u8f6f\u4ef6\u4fdd\u62a4\u6269\u5c55\uff09\u6280\u672f\u7684\u578b\u53f7CPU\u4e2d\uff0c\u6f0f\u6d1e\u547d\u540d\u4e3a\uff1aForeshadow\uff08\u9884\u5146\uff09\uff0c\u5229\u7528\u63a8\u6d4b\u6267\u884c\u4fa7\u4fe1\u9053\u653b\u51fb\uff0c\u5177\u6709\u672c\u5730\u7528\u6237\u8bbf\u95ee\u6743\u9650\u7684\u653b\u51fb\u8005\u53ef\u4ee5\u5b9e\u73b0\u672a\u7ecf\u6388\u6743\u8bfb\u53d6\u5230L1\u7f13\u5b58\u4e2d\u7684\u6570\u636e\uff0c\u4ece\u800c\u89e6\u53d1\u4fe1\u606f\u6cc4\u9732\u6548\u679c\uff0c\u53ef\u80fd\u5bfc\u81f4\u72ec\u7acb\u4e3b\u673a\u548c\u4e91\u5e73\u53f0\u4e3b\u673a\u5185\u5b58\u4fe1\u606f\u88ab\u672a\u7ecf\u6388\u6743\u8bfb\u53d6\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "Intel CPU Foreshadow\uff08\u9884\u5146\uff09\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": [
      "Intel 8th generation Intel\u00ae Core\u2122 processors",
      "Intel 7th generation Intel\u00ae Core\u2122 processors",
      "Intel 6th generation Intel\u00ae Core\u2122 processors",
      "Intel Intel\u00ae Xeon\u00ae Processor E3 v5 Family",
      "Intel Intel\u00ae Xeon\u00ae Processor E3 v6 Family"
    ]
  },
  "referenceLink": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html",
  "serverity": "\u4e2d",
  "submitTime": "2018-08-16",
  "title": "Intel CPU Foreshadow\uff08\u9884\u5146\uff09\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…