wid-sec-w-2023-2072
Vulnerability from csaf_certbund
Published
2018-05-21 22:00
Modified
2023-08-17 22:00
Summary
Prozessoren verschiedener Hersteller: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen

Notes

Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Der Prozessor ist das zentrale Rechenwerk eines Computers.
Angriff
Ein lokaler Angreifer kann mehrere Schwachstellen in Prozessoren unterschiedlicher Hersteller ausnutzen, um Sicherheitsvorkehrungen zu umgehen.
Betroffene Betriebssysteme
- UNIX - Linux - Windows - CISCO Appliance - Sonstiges



{
  "document": {
    "aggregate_severity": {
      "text": "niedrig"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "Der Prozessor ist das zentrale Rechenwerk eines Computers.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein lokaler Angreifer kann mehrere Schwachstellen in Prozessoren unterschiedlicher Hersteller ausnutzen, um Sicherheitsvorkehrungen zu umgehen.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- UNIX\n- Linux\n- Windows\n- CISCO Appliance\n- Sonstiges",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2023-2072 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2018/wid-sec-w-2023-2072.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2023-2072 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2072"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2023:3349-1 vom 2023-08-17",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-August/015945.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2023:3333-1 vom 2023-08-16",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-August/015911.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2023:3324-1 vom 2023-08-16",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-August/015910.html"
      },
      {
        "category": "external",
        "summary": "Intel Security Advisory INTEL-SA-00115 vom 2018-05-21",
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
      },
      {
        "category": "external",
        "summary": "VmWare Security Advisory VMSA-2018-0012",
        "url": "https://www.vmware.com/security/advisories/VMSA-2018-0012.html"
      },
      {
        "category": "external",
        "summary": "Microsoft Advisory ADV180012",
        "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180012"
      },
      {
        "category": "external",
        "summary": "Cisco Security Advisory cisco-sa-20180521-cpusidechannel",
        "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel"
      },
      {
        "category": "external",
        "summary": "AMD Security Advisory",
        "url": "https://www.amd.com/en/corporate/security-updates"
      },
      {
        "category": "external",
        "summary": "Microsoft Advisory ADV180013",
        "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180013"
      },
      {
        "category": "external",
        "summary": "RedHat CVE Database",
        "url": "https://access.redhat.com/security/cve/cve-2018-3639"
      },
      {
        "category": "external",
        "summary": "RedHat CVE Database",
        "url": "https://access.redhat.com/security/cve/cve-2018-3640"
      },
      {
        "category": "external",
        "summary": "Citrix Security Advisory CTX235225 vom 2018-05-22",
        "url": "https://support.citrix.com/article/CTX235225"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2018-4114 vom 2018-05-23",
        "url": "http://linux.oracle.com/errata/ELSA-2018-4114.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2018:1635 vom 2018-05-22",
        "url": "http://rhn.redhat.com/errata/RHSA-2018-1635.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2018:1636 vom 2018-05-22",
        "url": "http://rhn.redhat.com/errata/RHSA-2018-1636.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2018:1377-1 vom 2018-05-23",
        "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181377-1.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2018:1366-1 vom 2018-05-23",
        "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181366-1.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2018:1376-1 vom 2018-05-23",
        "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181376-1.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2018:1378-1 vom 2018-05-23",
        "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181378-1.html"
      },
      {
        "category": "external",
        "summary": "Oraclevm-errata OVMSA-2018-0223 vom 2018-05-23",
        "url": "https://oss.oracle.com/pipermail/oraclevm-errata/2018-May/000858.html"
      },
      {
        "category": "external",
        "summary": "Update des Cisco Security Advisory cisco-sa-20180521-cpusidechannel vom 2018-05-23",
        "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DSA-4210 vom 2018-05-25",
        "url": "https://www.debian.org/security/2018/dsa-4210"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2018:1826 vom 2018-06-12",
        "url": "http://rhn.redhat.com/errata/RHSA-2018-1826.html"
      },
      {
        "category": "external",
        "summary": "libvirt Security Notice LSN-2018-0005 vom 2018-06-13",
        "url": "http://security.libvirt.org/2018/0005.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2018:1816-1 vom 2018-06-26",
        "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181816-1.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2018:1965 vom 2018-06-27",
        "url": "https://access.redhat.com/errata/RHSA-2018:1965"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2018:1967 vom 2018-06-27",
        "url": "https://access.redhat.com/errata/RHSA-2018:1967"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2018:1997 vom 2018-06-27",
        "url": "https://access.redhat.com/errata/RHSA-2018:1997"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2018:2001 vom 2018-06-27",
        "url": "https://access.redhat.com/errata/RHSA-2018:2001"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2018:2003 vom 2018-06-27",
        "url": "https://access.redhat.com/errata/RHSA-2018:2003"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2018:2060 vom 2018-06-27",
        "url": "http://rhn.redhat.com/errata/RHSA-2018-2060.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2018-2162 vom 2018-07-11",
        "url": "http://linux.oracle.com/errata/ELSA-2018-2162.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2018-2164 vom 2018-07-11",
        "url": "http://linux.oracle.com/errata/ELSA-2018-2164.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2018:2162 vom 2018-07-11",
        "url": "https://access.redhat.com/errata/RHSA-2018:2162"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2018:2161 vom 2018-07-11",
        "url": "https://access.redhat.com/errata/RHSA-2018:2161"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2018:2164 vom 2018-07-11",
        "url": "https://access.redhat.com/errata/RHSA-2018:2164"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2018:2172 vom 2018-07-11",
        "url": "http://rhn.redhat.com/errata/RHSA-2018-2172.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2018:1935-1 vom 2018-07-13",
        "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181935-1.html"
      },
      {
        "category": "external",
        "summary": "CentOS Security Advisory CESA-2018:2162 vom 2018-07-13",
        "url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2018-2162-Important-CentOS-6-qemu-kvm-Security-Update-tp4645175.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2018:2216 vom 2018-07-17",
        "url": "http://rhn.redhat.com/errata/RHSA-2018-2216.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2018:2228 vom 2018-07-20",
        "url": "https://access.redhat.com/errata/RHSA-2018:2228"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2018:2246 vom 2018-07-24",
        "url": "https://access.redhat.com/errata/RHSA-2018:2246"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2018:2250 vom 2018-07-24",
        "url": "https://access.redhat.com/errata/RHSA-2018:2250"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2018:2258 vom 2018-07-25",
        "url": "https://access.redhat.com/errata/RHSA-2018:2258"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2018:2076-1 vom 2018-07-27",
        "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182076-1.html"
      },
      {
        "category": "external",
        "summary": "Update des Cisco Security Advisory cisco-sa-20180521-cpusidechannel vom 2018-07-26",
        "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2018:2082-1 vom 2018-07-28",
        "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182082-1.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2018:2092-1 vom 2018-07-28",
        "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182092-1.html"
      },
      {
        "category": "external",
        "summary": "Lenovo Security Advisory LEN-22133 vom 2018-07-27",
        "url": "https://support.lenovo.com/de/de/solutions/len-22133"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2018:2289 vom 2018-07-30",
        "url": "http://rhn.redhat.com/errata/RHSA-2018-2289.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2018:2289 vom 2018-07-31",
        "url": "https://access.redhat.com/errata/RHSA-2018:2289"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2018:2309 vom 2018-08-06",
        "url": "https://access.redhat.com/errata/RHSA-2018:2309"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2018:2328 vom 2018-08-06",
        "url": "https://access.redhat.com/errata/RHSA-2018:2328"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2018:2364 vom 2018-08-07",
        "url": "http://rhn.redhat.com/errata/RHSA-2018-2364.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2018:2363 vom 2018-08-07",
        "url": "http://rhn.redhat.com/errata/RHSA-2018-2363.html"
      },
      {
        "category": "external",
        "summary": "Microsoft Security Advisory ADV180013",
        "url": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/ADV180013"
      },
      {
        "category": "external",
        "summary": "Microsoft Security Advisory ADV180012",
        "url": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/ADV180012"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2018:2304-1 vom 2018-08-12",
        "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182304-1.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2018:2384 vom 2018-08-15",
        "url": "https://access.redhat.com/errata/RHSA-2018:2384"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2018:2387 vom 2018-08-15",
        "url": "https://access.redhat.com/errata/RHSA-2018:2387"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2018:2388 vom 2018-08-15",
        "url": "https://access.redhat.com/errata/RHSA-2018:2388"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2018:2389 vom 2018-08-15",
        "url": "https://access.redhat.com/errata/RHSA-2018:2389"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2018:2395 vom 2018-08-15",
        "url": "https://access.redhat.com/errata/RHSA-2018:2395"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2018:2390 vom 2018-08-15",
        "url": "https://access.redhat.com/errata/RHSA-2018:2390"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2018:2391 vom 2018-08-15",
        "url": "https://access.redhat.com/errata/RHSA-2018:2391"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2018:2392 vom 2018-08-15",
        "url": "https://access.redhat.com/errata/RHSA-2018:2392"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2018:2393 vom 2018-08-15",
        "url": "https://access.redhat.com/errata/RHSA-2018:2393"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2018:2394 vom 2018-08-15",
        "url": "https://access.redhat.com/errata/RHSA-2018:2394"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2018:2396 vom 2018-08-15",
        "url": "https://access.redhat.com/errata/RHSA-2018:2396"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2018:2331-1 vom 2018-08-15",
        "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182331-1.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2018-4198 vom 2018-08-16",
        "url": "http://linux.oracle.com/errata/ELSA-2018-4198.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2018:2338-1 vom 2018-08-16",
        "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182338-1.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2018:2335-1 vom 2018-08-16",
        "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182335-1.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2018:2340-1 vom 2018-08-16",
        "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182340-1.html"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DSA-4273 vom 2018-08-17",
        "url": "https://www.debian.org/security/2018/dsa-4273"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-3756-1 vom 2018-08-28",
        "url": "http://www.ubuntu.com/usn/usn-3756-1"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2018:2556-1 vom 2018-08-30",
        "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182556-1.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2018:2565-1 vom 2018-08-31",
        "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182565-1.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2018:2615-1 vom 2018-09-05",
        "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182615-1/"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2018:2650-1 vom 2018-09-07",
        "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182650-1.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2018-4235 vom 2018-10-02",
        "url": "http://linux.oracle.com/errata/ELSA-2018-4235.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2018:3407 vom 2018-10-31",
        "url": "https://access.redhat.com/errata/RHSA-2018:3407"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2018-4285 vom 2018-11-21",
        "url": "http://linux.oracle.com/errata/ELSA-2018-4285.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2019:0049-1 vom 2019-01-10",
        "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190049-1/"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2019-4531 vom 2019-02-07",
        "url": "http://linux.oracle.com/errata/ELSA-2019-4531.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2019-4585 vom 2019-03-15",
        "url": "http://linux.oracle.com/errata/ELSA-2019-4585.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2019:1046 vom 2019-05-08",
        "url": "https://access.redhat.com/errata/RHSA-2019:1046"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2019:1211-1 vom 2019-05-11",
        "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191211-1.html"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DSA-4469 vom 2019-06-23",
        "url": "https://www.debian.org/security/2019/dsa-4469"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2019-4702 vom 2019-08-04",
        "url": "http://linux.oracle.com/errata/ELSA-2019-4702.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2019-4732 vom 2019-08-04",
        "url": "http://linux.oracle.com/errata/ELSA-2019-4732.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2020-0202 vom 2020-04-24",
        "url": "https://oss.oracle.com/pipermail/el-errata/2020-January/009541.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2020-0196 vom 2020-04-24",
        "url": "https://oss.oracle.com/pipermail/el-errata/2020-January/009537.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2020-0157 vom 2020-04-24",
        "url": "https://oss.oracle.com/pipermail/el-errata/2020-January/009534.html"
      },
      {
        "category": "external",
        "summary": "Juniper Security Advisory JSA11023 vom 2020-07-08",
        "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11023"
      },
      {
        "category": "external",
        "summary": "Huawei Security Advisory HUAWEI-SA-20180615-01-CPU vom 2020-07-22",
        "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180615-01-cpu-en"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DLA-2323 vom 2020-08-12",
        "url": "https://lists.debian.org/debian-lts-announce/2020/debian-lts-announce-202008/msg00019.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2020:2540-1 vom 2020-09-04",
        "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007375.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2021:3007-1 vom 2021-09-09",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-September/009422.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2021:3969-1 vom 2021-12-07",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html"
      }
    ],
    "source_lang": "en-US",
    "title": "Prozessoren verschiedener Hersteller: Mehrere Schwachstellen erm\u00f6glichen Umgehen von Sicherheitsvorkehrungen",
    "tracking": {
      "current_release_date": "2023-08-17T22:00:00.000+00:00",
      "generator": {
        "date": "2024-02-15T17:40:40.032+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.3.0"
        }
      },
      "id": "WID-SEC-W-2023-2072",
      "initial_release_date": "2018-05-21T22:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2018-05-21T22:00:00.000+00:00",
          "number": "1",
          "summary": "Initial Release"
        },
        {
          "date": "2018-05-21T22:00:00.000+00:00",
          "number": "2",
          "summary": "Version nicht vorhanden"
        },
        {
          "date": "2018-05-22T22:00:00.000+00:00",
          "number": "3",
          "summary": "\u00e4nderungen"
        },
        {
          "date": "2018-05-22T22:00:00.000+00:00",
          "number": "4",
          "summary": "referenzen"
        },
        {
          "date": "2018-05-22T22:00:00.000+00:00",
          "number": "5",
          "summary": "Version nicht vorhanden"
        },
        {
          "date": "2018-05-22T22:00:00.000+00:00",
          "number": "6",
          "summary": "New remediations available"
        },
        {
          "date": "2018-05-22T22:00:00.000+00:00",
          "number": "7",
          "summary": "Version nicht vorhanden"
        },
        {
          "date": "2018-05-23T22:00:00.000+00:00",
          "number": "8",
          "summary": "New remediations available"
        },
        {
          "date": "2018-05-23T22:00:00.000+00:00",
          "number": "9",
          "summary": "Version nicht vorhanden"
        },
        {
          "date": "2018-05-23T22:00:00.000+00:00",
          "number": "10",
          "summary": "Version nicht vorhanden"
        },
        {
          "date": "2018-05-23T22:00:00.000+00:00",
          "number": "11",
          "summary": "Version nicht vorhanden"
        },
        {
          "date": "2018-05-24T22:00:00.000+00:00",
          "number": "12",
          "summary": "Added references"
        },
        {
          "date": "2018-05-27T22:00:00.000+00:00",
          "number": "13",
          "summary": "New remediations available"
        },
        {
          "date": "2018-05-28T22:00:00.000+00:00",
          "number": "14",
          "summary": "new updates SuSE"
        },
        {
          "date": "2018-05-28T22:00:00.000+00:00",
          "number": "15",
          "summary": "Added references"
        },
        {
          "date": "2018-05-31T22:00:00.000+00:00",
          "number": "16",
          "summary": "neue Updates Suse"
        },
        {
          "date": "2018-06-07T22:00:00.000+00:00",
          "number": "17",
          "summary": "Added references"
        },
        {
          "date": "2018-06-13T22:00:00.000+00:00",
          "number": "18",
          "summary": "New remediations available"
        },
        {
          "date": "2018-06-17T22:00:00.000+00:00",
          "number": "19",
          "summary": "Added references"
        },
        {
          "date": "2018-06-27T22:00:00.000+00:00",
          "number": "20",
          "summary": "Added references"
        },
        {
          "date": "2018-07-01T22:00:00.000+00:00",
          "number": "21",
          "summary": "Added references"
        },
        {
          "date": "2018-07-11T22:00:00.000+00:00",
          "number": "22",
          "summary": "New remediations available"
        },
        {
          "date": "2018-07-12T22:00:00.000+00:00",
          "number": "23",
          "summary": "New remediations available"
        },
        {
          "date": "2018-07-15T22:00:00.000+00:00",
          "number": "24",
          "summary": "New remediations available"
        },
        {
          "date": "2018-07-17T22:00:00.000+00:00",
          "number": "25",
          "summary": "New remediations available"
        },
        {
          "date": "2018-07-19T22:00:00.000+00:00",
          "number": "26",
          "summary": "New remediations available"
        },
        {
          "date": "2018-07-24T22:00:00.000+00:00",
          "number": "27",
          "summary": "New remediations available"
        },
        {
          "date": "2018-07-24T22:00:00.000+00:00",
          "number": "28",
          "summary": "New remediations available"
        },
        {
          "date": "2018-07-25T22:00:00.000+00:00",
          "number": "29",
          "summary": "New remediations available"
        },
        {
          "date": "2018-07-26T22:00:00.000+00:00",
          "number": "30",
          "summary": "New remediations available"
        },
        {
          "date": "2018-07-26T22:00:00.000+00:00",
          "number": "31",
          "summary": "Version nicht vorhanden"
        },
        {
          "date": "2018-07-29T22:00:00.000+00:00",
          "number": "32",
          "summary": "New remediations available"
        },
        {
          "date": "2018-07-29T22:00:00.000+00:00",
          "number": "33",
          "summary": "Version nicht vorhanden"
        },
        {
          "date": "2018-07-30T22:00:00.000+00:00",
          "number": "34",
          "summary": "New remediations available"
        },
        {
          "date": "2018-08-05T22:00:00.000+00:00",
          "number": "35",
          "summary": "New remediations available"
        },
        {
          "date": "2018-08-07T22:00:00.000+00:00",
          "number": "36",
          "summary": "New remediations available"
        },
        {
          "date": "2018-08-08T22:00:00.000+00:00",
          "number": "37",
          "summary": "New remediations available"
        },
        {
          "date": "2018-08-08T22:00:00.000+00:00",
          "number": "38",
          "summary": "New remediations available"
        },
        {
          "date": "2018-08-12T22:00:00.000+00:00",
          "number": "39",
          "summary": "New remediations available"
        },
        {
          "date": "2018-08-14T22:00:00.000+00:00",
          "number": "40",
          "summary": "New remediations available"
        },
        {
          "date": "2018-08-15T22:00:00.000+00:00",
          "number": "41",
          "summary": "New remediations available"
        },
        {
          "date": "2018-08-16T22:00:00.000+00:00",
          "number": "42",
          "summary": "New remediations available"
        },
        {
          "date": "2018-08-16T22:00:00.000+00:00",
          "number": "43",
          "summary": "Version nicht vorhanden"
        },
        {
          "date": "2018-08-16T22:00:00.000+00:00",
          "number": "44",
          "summary": "Version nicht vorhanden"
        },
        {
          "date": "2018-08-27T22:00:00.000+00:00",
          "number": "45",
          "summary": "Added references"
        },
        {
          "date": "2018-08-27T22:00:00.000+00:00",
          "number": "46",
          "summary": "New remediations available"
        },
        {
          "date": "2018-08-30T22:00:00.000+00:00",
          "number": "47",
          "summary": "New remediations available"
        },
        {
          "date": "2018-09-04T22:00:00.000+00:00",
          "number": "48",
          "summary": "New remediations available"
        },
        {
          "date": "2018-09-09T22:00:00.000+00:00",
          "number": "49",
          "summary": "New remediations available"
        },
        {
          "date": "2018-10-01T22:00:00.000+00:00",
          "number": "50",
          "summary": "New remediations available"
        },
        {
          "date": "2018-10-30T23:00:00.000+00:00",
          "number": "51",
          "summary": "New remediations available"
        },
        {
          "date": "2018-11-20T23:00:00.000+00:00",
          "number": "52",
          "summary": "New remediations available"
        },
        {
          "date": "2019-01-09T23:00:00.000+00:00",
          "number": "53",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2019-02-06T23:00:00.000+00:00",
          "number": "54",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2019-03-03T23:00:00.000+00:00",
          "number": "55",
          "summary": "Referenz(en) aufgenommen: ELSA-2019-0435"
        },
        {
          "date": "2019-03-14T23:00:00.000+00:00",
          "number": "56",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2019-05-02T22:00:00.000+00:00",
          "number": "57",
          "summary": "Referenz(en) aufgenommen: FEDORA-2019-8F2B27EFCE"
        },
        {
          "date": "2019-05-08T22:00:00.000+00:00",
          "number": "58",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2019-05-12T22:00:00.000+00:00",
          "number": "59",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2019-06-23T22:00:00.000+00:00",
          "number": "60",
          "summary": "Neue Updates von Debian aufgenommen"
        },
        {
          "date": "2019-08-04T22:00:00.000+00:00",
          "number": "61",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2020-04-23T22:00:00.000+00:00",
          "number": "62",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2020-07-08T22:00:00.000+00:00",
          "number": "63",
          "summary": "Neue Updates von Juniper aufgenommen"
        },
        {
          "date": "2020-07-22T22:00:00.000+00:00",
          "number": "64",
          "summary": "Neue Updates von Huawei aufgenommen"
        },
        {
          "date": "2020-08-12T22:00:00.000+00:00",
          "number": "65",
          "summary": "Neue Updates von Debian aufgenommen"
        },
        {
          "date": "2020-09-06T22:00:00.000+00:00",
          "number": "66",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2021-09-09T22:00:00.000+00:00",
          "number": "67",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2021-12-07T23:00:00.000+00:00",
          "number": "68",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2023-08-15T22:00:00.000+00:00",
          "number": "69",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2023-08-16T22:00:00.000+00:00",
          "number": "70",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2023-08-17T22:00:00.000+00:00",
          "number": "71",
          "summary": "Neue Updates von SUSE aufgenommen"
        }
      ],
      "status": "final",
      "version": "71"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Cisco Catalyst",
            "product": {
              "name": "Cisco Catalyst",
              "product_id": "T000491",
              "product_identification_helper": {
                "cpe": "cpe:/h:cisco:catalyst:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Cisco Nexus",
            "product": {
              "name": "Cisco Nexus",
              "product_id": "T004033",
              "product_identification_helper": {
                "cpe": "cpe:/h:cisco:nexus:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Cisco Router",
            "product": {
              "name": "Cisco Router",
              "product_id": "T003258",
              "product_identification_helper": {
                "cpe": "cpe:/h:cisco:router:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Cisco Unified Computing System (UCS)",
            "product": {
              "name": "Cisco Unified Computing System (UCS)",
              "product_id": "163824",
              "product_identification_helper": {
                "cpe": "cpe:/h:cisco:unified_computing_system:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Cisco"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Citrix Systems XenServer 7.0",
                "product": {
                  "name": "Citrix Systems XenServer 7.0",
                  "product_id": "T007798",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:citrix:xenserver:7.0"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Citrix Systems XenServer 7.1",
                "product": {
                  "name": "Citrix Systems XenServer 7.1",
                  "product_id": "T009506",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:citrix:xenserver:7.1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Citrix Systems XenServer 7.2",
                "product": {
                  "name": "Citrix Systems XenServer 7.2",
                  "product_id": "T010154",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:citrix:xenserver:7.2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Citrix Systems XenServer 7.3",
                "product": {
                  "name": "Citrix Systems XenServer 7.3",
                  "product_id": "T011969",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:citrix:xenserver:7.3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Citrix Systems XenServer 7.4",
                "product": {
                  "name": "Citrix Systems XenServer 7.4",
                  "product_id": "T012232",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:citrix:xenserver:7.4"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "XenServer"
          }
        ],
        "category": "vendor",
        "name": "Citrix Systems"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Debian Linux",
            "product": {
              "name": "Debian Linux",
              "product_id": "2951",
              "product_identification_helper": {
                "cpe": "cpe:/o:debian:debian_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Debian"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Huawei OceanStor",
            "product": {
              "name": "Huawei OceanStor",
              "product_id": "T016821",
              "product_identification_helper": {
                "cpe": "cpe:/h:huawei:oceanstor_uds:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Huawei"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Intel Prozessor",
            "product": {
              "name": "Intel Prozessor",
              "product_id": "T011586",
              "product_identification_helper": {
                "cpe": "cpe:/h:intel:intel_prozessor:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Intel"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Juniper Junos Space \u003c 20.1R1",
            "product": {
              "name": "Juniper Junos Space \u003c 20.1R1",
              "product_id": "T016874",
              "product_identification_helper": {
                "cpe": "cpe:/a:juniper:junos_space:20.1r1"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Juniper"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Lenovo BIOS",
            "product": {
              "name": "Lenovo BIOS",
              "product_id": "T005651",
              "product_identification_helper": {
                "cpe": "cpe:/h:lenovo:bios:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Lenovo"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Open Source CentOS",
            "product": {
              "name": "Open Source CentOS",
              "product_id": "1727",
              "product_identification_helper": {
                "cpe": "cpe:/o:centos:centos:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Open Source QEMU",
            "product": {
              "name": "Open Source QEMU",
              "product_id": "185878",
              "product_identification_helper": {
                "cpe": "cpe:/a:qemu:qemu:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Open Source"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Oracle Linux",
            "product": {
              "name": "Oracle Linux",
              "product_id": "T004914",
              "product_identification_helper": {
                "cpe": "cpe:/o:oracle:linux:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Oracle VM",
            "product": {
              "name": "Oracle VM",
              "product_id": "T011119",
              "product_identification_helper": {
                "cpe": "cpe:/a:oracle:vm:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Oracle"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Red Hat Enterprise Linux",
            "product": {
              "name": "Red Hat Enterprise Linux",
              "product_id": "67646",
              "product_identification_helper": {
                "cpe": "cpe:/o:redhat:enterprise_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "SUSE Linux",
            "product": {
              "name": "SUSE Linux",
              "product_id": "T002207",
              "product_identification_helper": {
                "cpe": "cpe:/o:suse:suse_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Ubuntu Linux",
            "product": {
              "name": "Ubuntu Linux",
              "product_id": "T000126",
              "product_identification_helper": {
                "cpe": "cpe:/o:canonical:ubuntu_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Ubuntu"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "VMware ESXi",
            "product": {
              "name": "VMware ESXi",
              "product_id": "T009575",
              "product_identification_helper": {
                "cpe": "cpe:/o:vmware:esxi:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "VMware Fusion",
            "product": {
              "name": "VMware Fusion",
              "product_id": "136752",
              "product_identification_helper": {
                "cpe": "cpe:/a:vmware:fusion:3.1"
              }
            }
          },
          {
            "category": "product_name",
            "name": "VMware vCenter Server (VirtualCenter)",
            "product": {
              "name": "VMware vCenter Server (VirtualCenter)",
              "product_id": "T012302",
              "product_identification_helper": {
                "cpe": "cpe:/a:vmware:vcenter_server:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "VMware"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2018-3639",
      "notes": [
        {
          "category": "description",
          "text": "Es existiert eine Schwachstelle in Prozessoren mehrerer Hersteller. Diese, Spectre V4 genannte Schwachstelle kann wie Spectre V1 und V2 \u00fcber einen Seitenkanalangriff ausgenutzt werden (Speculative Store Bypass (SSB)). Ein lokaler Angreifer kann das ausnutzen um Teile des physikalischen Speicher auszulesen und so Sicherheitsmechanismen zu umgehen."
        }
      ],
      "product_status": {
        "known_affected": [
          "185878",
          "T004033",
          "T005651",
          "T011119",
          "T007798",
          "163824",
          "136752",
          "67646",
          "T009506",
          "T003258",
          "T012302",
          "T010154",
          "T016821",
          "T011586",
          "T012232",
          "T004914",
          "2951",
          "T002207",
          "T000126",
          "1727",
          "T009575",
          "T011969",
          "T000491"
        ]
      },
      "release_date": "2018-05-21T22:00:00Z",
      "title": "CVE-2018-3639"
    },
    {
      "cve": "CVE-2018-3640",
      "notes": [
        {
          "category": "description",
          "text": "Es existiert eine Schwachstelle in Prozessoren mehrerer Hersteller. Diese, Spectre V4 genannte Schwachstelle kann wie Spectre V1 und V2 \u00fcber einen Seitenkanalangriff ausgenutzt werden (Rogue System Register Read (RSRE)). Ein lokaler Angreifer kann das ausnutzen um Teile des physikalischen Speicher auszulesen und so Sicherheitsmechanismen zu umgehen."
        }
      ],
      "product_status": {
        "known_affected": [
          "185878",
          "T004033",
          "T005651",
          "T011119",
          "T007798",
          "163824",
          "136752",
          "67646",
          "T009506",
          "T003258",
          "T012302",
          "T010154",
          "T011586",
          "T012232",
          "T004914",
          "2951",
          "T002207",
          "T000126",
          "1727",
          "T009575",
          "T011969",
          "T000491"
        ]
      },
      "release_date": "2018-05-21T22:00:00Z",
      "title": "CVE-2018-3640"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.